In: Computer Science
List and describe at least two types of online intrusion. How does it affect your system? What potential harm can they cause to you or your device? For each choice, explain how you can defend your system.
In 2016 a massive DDoS attack against a cloud service company called Dyn shocked security experts. Look for information about this attack online. How many IP addresses or devices were involved in this attack? What was the name of the malware? Name some of the Internet sites that were affected by this attack.
Asymmetric Routing
In this method, the attacker attempts to utilize more than one route to the targeted network device. The idea is to have the overall attack evade detection by having a significant portion of the offending packets bypass certain network segments and their network intrusion sensors. Networks that are not set up for asymmetric routing are impervious to this attack methodology.
Buffer Overflow Attacks
This approach attempts to overwrite specific sections of computer memory within a network, replacing normal data in those memory locations with a set of commands that will later be executed as part of the attack. In most cases, the goal is to initiate a denial of service (DoS) situation, or to set up a channel through which the attacker can gain remote access to the network. Accomplishing such attacks is more difficult when network designers keep buffer sizes relatively small, and/or install boundary-checking logic that identifies executable code or lengthy URL strings before it can be written to the buffer.