Question

In: Electrical Engineering

Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will...

Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will being connection-oriented be different for TCP and UDP?

Solutions

Expert Solution

A distributed denial of service (DDoS) attack is a malicious attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server.

A DDoS attack is launched from numerous compromised devices, often distributed globally in what is referred to as a botnet. It is distinct from other denial of service (DoS) attacks, in that it uses a single Internet-connected device (one network connection) to flood a target with malicious traffic. This nuance is the main reason for the existence of these two, somewhat different, definitions.

A UDP flood, by definition, is any DDoS attack that floods a target with User Datagram Protocol (UDP) packets. The goal of the attack is to flood random ports on a remote host. This causes the host to repeatedly check for the application listening at that port, and (when no application is found) reply with an ICMP ‘Destination Unreachable’ packet. This process saps host resources, which can ultimately lead to inaccessibility.

Connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent. Connection-oriented protocol service is sometimes called a "reliable" network service, because it guarantees that data will arrive in the proper sequence.

TRANSMISSION CONTROL PROTOCOL (TCP) USER DATAGRAM PROTOCOL (UDP)
TCP is a connection-oriented protocol. Connection-orientation means that the communicating devices should establish a connection before transmitting data and should close the connection after transmitting the data. UDP is the Datagram oriented protocol. This is because there is no overhead for opening a connection, maintaining a connection, and terminating a connection. UDP is efficient for broadcast and multicast type of network transmission.

Related Solutions

What are the services provided by TCP?  What services are provided by UDP?
What are the services provided by TCP?  What services are provided by UDP?
What is UDP and how does it work? What are the differences between TCP and UDP?....
What is UDP and how does it work? What are the differences between TCP and UDP?. Provide examples (if applicable) to support your comparative review.
What are the differences between TCP and UDP? What are transport protocols?
What are the differences between TCP and UDP? What are transport protocols?
Research real-world attacks that have been made against TCP and report on one of them. (i)...
Research real-world attacks that have been made against TCP and report on one of them. (i) How was the attack accomplished? (ii) How was the target able to mitigate or stop the attack? (iii) Who was the attacker (v) what was their apparent motivation?
WHAT ARE THE DIFFERENCES BETWEEN TCP/IP AND UDP IN TERMS OF OSI LAYERS AND DEFINITION ITSELF?...
WHAT ARE THE DIFFERENCES BETWEEN TCP/IP AND UDP IN TERMS OF OSI LAYERS AND DEFINITION ITSELF? PLEASE GIVE BREIFE EXPLANATIONS WITH PICTURES AND EXAMPLES WITH EASY ENOUGH TO MEMORIZE AND UNDERSTAND
b) UDP does not provide end to end flow control, but TCP does. Explain how this...
b) UDP does not provide end to end flow control, but TCP does. Explain how this is achieved using sequence numbers. Give an example where a packetized message sent using UDP is received incorrectly, but when using TCP it is received correctly under same circumstances without channel errors.                                                                     
1. Explain one aspect of UDP that makes it better than TCP. 2. Explain what is...
1. Explain one aspect of UDP that makes it better than TCP. 2. Explain what is a socket. 3. Explain the difference in demultiplexing between UDP and TCP. 4. Illustrate a system of your choice with Finite State Machine.
What is the difference between TCP and UDP? Why would you use one over the other?...
What is the difference between TCP and UDP? Why would you use one over the other? Why have other nations enjoyed faster broadband speeds, greater availability, and lower prices? What advantages could broadband offer to underserved areas of the world? Is Internet access important for economic development? Why or why not?
Discuss how demultiplexing is carried out using TCP and UDP. (8 marks) Please make a table,...
Discuss how demultiplexing is carried out using TCP and UDP. Please make a table, one side FULLY explaining how demultiplexing is carried out using TCP and the other side FULLY explaining how demultiplexing is carried out using UDP.
How a cloud-based solution provider may reduce the risk of a DDoS attack ?
How a cloud-based solution provider may reduce the risk of a DDoS attack ?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT