Question

In: Electrical Engineering

Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will...

Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will being connection-oriented be different for TCP and UDP?

Solutions

Expert Solution

A distributed denial of service (DDoS) attack is a malicious attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server.

A DDoS attack is launched from numerous compromised devices, often distributed globally in what is referred to as a botnet. It is distinct from other denial of service (DoS) attacks, in that it uses a single Internet-connected device (one network connection) to flood a target with malicious traffic. This nuance is the main reason for the existence of these two, somewhat different, definitions.

A UDP flood, by definition, is any DDoS attack that floods a target with User Datagram Protocol (UDP) packets. The goal of the attack is to flood random ports on a remote host. This causes the host to repeatedly check for the application listening at that port, and (when no application is found) reply with an ICMP ‘Destination Unreachable’ packet. This process saps host resources, which can ultimately lead to inaccessibility.

Connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent. Connection-oriented protocol service is sometimes called a "reliable" network service, because it guarantees that data will arrive in the proper sequence.

TRANSMISSION CONTROL PROTOCOL (TCP) USER DATAGRAM PROTOCOL (UDP)
TCP is a connection-oriented protocol. Connection-orientation means that the communicating devices should establish a connection before transmitting data and should close the connection after transmitting the data. UDP is the Datagram oriented protocol. This is because there is no overhead for opening a connection, maintaining a connection, and terminating a connection. UDP is efficient for broadcast and multicast type of network transmission.

Related Solutions

What are the services provided by TCP?  What services are provided by UDP?
What are the services provided by TCP?  What services are provided by UDP?
What are the differences between TCP and UDP? What are transport protocols?
What are the differences between TCP and UDP? What are transport protocols?
WHAT ARE THE DIFFERENCES BETWEEN TCP/IP AND UDP IN TERMS OF OSI LAYERS AND DEFINITION ITSELF?...
WHAT ARE THE DIFFERENCES BETWEEN TCP/IP AND UDP IN TERMS OF OSI LAYERS AND DEFINITION ITSELF? PLEASE GIVE BREIFE EXPLANATIONS WITH PICTURES AND EXAMPLES WITH EASY ENOUGH TO MEMORIZE AND UNDERSTAND
b) UDP does not provide end to end flow control, but TCP does. Explain how this...
b) UDP does not provide end to end flow control, but TCP does. Explain how this is achieved using sequence numbers. Give an example where a packetized message sent using UDP is received incorrectly, but when using TCP it is received correctly under same circumstances without channel errors.                                                                     
1. Explain one aspect of UDP that makes it better than TCP. 2. Explain what is...
1. Explain one aspect of UDP that makes it better than TCP. 2. Explain what is a socket. 3. Explain the difference in demultiplexing between UDP and TCP. 4. Illustrate a system of your choice with Finite State Machine.
How a cloud-based solution provider may reduce the risk of a DDoS attack ?
How a cloud-based solution provider may reduce the risk of a DDoS attack ?
Describe what assurance services, attestation services, and auditing services are and how they’re related. How do...
Describe what assurance services, attestation services, and auditing services are and how they’re related. How do they differ from each other? What professional standards govern them?
Use the Internet to research defenses against cross-site attacks (XSS and XSRF). What are the common...
Use the Internet to research defenses against cross-site attacks (XSS and XSRF). What are the common defenses? How difficult are they to implement? Why are these defenses not used extensively? Write you finding here in your original post. Minimum 150 words for your response.
Describe three examples of how the Internet has altered the way you receive products or services....
Describe three examples of how the Internet has altered the way you receive products or services. Does the Internet offer you, the consumer, greater flexibility? How does the Internet improve your purchasing experiences? Have you experienced any drawbacks to using the Internet to make purchases?
Discuss how nation state sponsored attacks against businesses might be influenced by their respective state politics...
Discuss how nation state sponsored attacks against businesses might be influenced by their respective state politics as it relates to separation of government and business; Apply principles from the Fraud Triangle Theory as it relates to motivations for various threat actors; and Summarize key concepts that Business risk managers should take into consideration
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT