In: Computer Science
Mischievous hackers have employed ‘Theft of Service Attack’ on your IT infrastructure. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
Theft on service attack is also called as 'Denial of service attack'(DOS). A Denial of Service (DoS) attack is an attack meant to shut down a machine or network, making it inavailable to its intended users. DoS attacks attain this by flooding the target with traffic, or sending it information that triggers or activate a crash. In both instances, the DoS attack brokes legitimate users such as, employees, members, or account holders of the service or resource they anticipated.
Victims or attackers of Denial of Service attacks frequently target web servers of high ranking organizations such as banking, commerce, and media companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of sensitive information or other assets, they can cost the victim a great deal of time and money to handle.
There are two general methods of DoS attacks: They are flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and finally stop. Popular flood attacks include:
Other DoS attacks simply use vulnerabilities that cause the target system or service to crash. In these attacks, input is sent that takes advantage of bugs in the target that appropriately crash or severely damage the system, so that it can’t be accessed or used.
An additional type of Denial of Service attack is the Distributed Denial of Service (DDoS) attack. A DDoS attack occurs when multiple systems manage a synchronized DoS attack to a single target. The important difference is that instead of being attacked from one location, the target is attacked from many locations at once. The distribution of hosts that defines a DDoS provide the attacker various advantages:
Diagram for DOS attack: