Question

In: Computer Science

Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will...

Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will being connection oriented be different for TCP and UDP?

Solutions

Expert Solution

Answer)

The DDoS attack are mostly being performed by the cyber attackers which is a common one now by mostly controlling the botnet. The attacker here would target the IP address which would target and command the bots which are to be sent to the data packets to the IP.

For the TCP:

It is the TCP SYN flood which is a kind of DDoS attack that happens in the TCP that leads to exploiting the normal TCP three-way handshaking for consuming the resources on the target server and then rendering the unresponsive.

Mostly here the hacker sends the TCP connection request much faster than that of the targetted machine which can process those and causing the network to saturate.

The connection orientation in the TCP would be as follows:

1) First, the client would request the connection by sending the SYN messages to that of the server

2) The server then acknowledges by sending the SYN-ACK message to that of the client

3) When the client responds to the message with an ACK message then the connection gets established.

For UDP:

It is the UDP flood which is the kind of denial of service attack which happens in huge number with the UDP packet which is triggered to the targeted server and the device would have the ability to process and respond. Here the firewall would protect the targetted server but would get exhausted because of the UDP flooding.

The connection orientation in UDP is as follows:

1) The server would check the program if they are running fine or not and who is listening to the request at the specified port

2) When no such programs would be receiving the packets at the specified port then the server would respond with the ICMP packet for informing the sender that the destination was not reachable.

Hope this answer helps.
If you find this answer useful, do hit like.
Thanks


Related Solutions

Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will...
Describe how DDoS attacks may be mounted against TCP and UDP services. In what way will being connection-oriented be different for TCP and UDP?
What are the services provided by TCP?  What services are provided by UDP?
What are the services provided by TCP?  What services are provided by UDP?
What is UDP and how does it work? What are the differences between TCP and UDP?....
What is UDP and how does it work? What are the differences between TCP and UDP?. Provide examples (if applicable) to support your comparative review.
What are the differences between TCP and UDP? What are transport protocols?
What are the differences between TCP and UDP? What are transport protocols?
Research real-world attacks that have been made against TCP and report on one of them. (i)...
Research real-world attacks that have been made against TCP and report on one of them. (i) How was the attack accomplished? (ii) How was the target able to mitigate or stop the attack? (iii) Who was the attacker (v) what was their apparent motivation?
WHAT ARE THE DIFFERENCES BETWEEN TCP/IP AND UDP IN TERMS OF OSI LAYERS AND DEFINITION ITSELF?...
WHAT ARE THE DIFFERENCES BETWEEN TCP/IP AND UDP IN TERMS OF OSI LAYERS AND DEFINITION ITSELF? PLEASE GIVE BREIFE EXPLANATIONS WITH PICTURES AND EXAMPLES WITH EASY ENOUGH TO MEMORIZE AND UNDERSTAND
. What is the primary difference between UDP and TCP? One is connection-oriented, one is connectionless...
. What is the primary difference between UDP and TCP? One is connection-oriented, one is connectionless One uses checksums, one does not One is used by a router, the other by a bridge One is used by IP, the other is used by ICMP They are identical 33. A router deals with which part of the IP address: NIC PORT Host ID Network ID 34. A hop in a TCP/IP network refers to: Going through a bridge Going through a...
b) UDP does not provide end to end flow control, but TCP does. Explain how this...
b) UDP does not provide end to end flow control, but TCP does. Explain how this is achieved using sequence numbers. Give an example where a packetized message sent using UDP is received incorrectly, but when using TCP it is received correctly under same circumstances without channel errors.                                                                     
1. Explain one aspect of UDP that makes it better than TCP. 2. Explain what is...
1. Explain one aspect of UDP that makes it better than TCP. 2. Explain what is a socket. 3. Explain the difference in demultiplexing between UDP and TCP. 4. Illustrate a system of your choice with Finite State Machine.
What is the difference between TCP and UDP? Why would you use one over the other?...
What is the difference between TCP and UDP? Why would you use one over the other? Why have other nations enjoyed faster broadband speeds, greater availability, and lower prices? What advantages could broadband offer to underserved areas of the world? Is Internet access important for economic development? Why or why not?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT