Question

In: Computer Science

A hacker overloads the KOI website and shutdowns the service so that legitimate users such as...

A hacker overloads the KOI website and shutdowns the service so that legitimate users such as student and staff can no longer access it. Mention the name and describe the type of attack carried out on the KOI website with an explanation

Solutions

Expert Solution

This type of attack is known as Denial of Service (DoS) attack . In the above example, the hacker has particularly used flooding attack for denial of services .

Let us look into each of these attacks seperately-

Denial of Service (DoS) attacks : A “denial of service” or DoS attack is used to tie up a website’s resources so that users who need to access the site cannot do so. This attack meant to shut down a machine or network, making it inaccessible to its intended users.Unlike a virus or malware, a DoS attack doesn’t depend on a special program to run. Instead, it takes advantage of an inherent vulnerability in the way computer networks communicate.

DoS attacks are generally of two types:

  • Flooding attacks
  • Crash attacks

Flooding attacks : This type of attack is done by sending too much traffic to the server causing them to slow down and eventually stop. Popular flood attacks include:

  • ICMP flood - This type of DoS attack sends spoofed packets of information that hit every computer in a targeted network, taking advantage of misconfigured network devices.The network is then triggered to amplify the traffic. This attack is also known as the smurf attack or ping of death.
  • SYN flood- A SYN flood is a variation that exploits a vulnerability in the TCP connection sequence.It sends a request to connect to a server, but never completes the handshake. This process continues until all open ports are saturated with requests and none are available for legitimate users to connect to.

Crash attacks: These attacks simply exploit vulnerabilities that cause the target system or service to crash.In these attacks, input is sent that takes advantage of bugs in the target that subsequently crash or severely destabilize the system, so that it can’t be accessed or used.


Related Solutions

A hacker overloads the KOI website and shutdowns the service so that legitimate users such as...
A hacker overloads the KOI website and shutdowns the service so that legitimate users such as student and staff can no longer access it. Mention the name and describe the type of attack carried out on the KOI website with an explanation
Modify the FeetInches class so that it overloads the following operators: <= >= != Demonstrate the...
Modify the FeetInches class so that it overloads the following operators: <= >= != Demonstrate the class's capabilities in a simple program. this is what needs to be modified // Specification file for the FeetInches class #ifndef FEETINCHES_H #define FEETINCHES_H #include <iostream> using namespace std; class FeetInches; // Forward Declaration // Function Prototypes for Overloaded Stream Operators ostream &operator << (ostream &, const FeetInches &); istream &operator >> (istream &, FeetInches &); // The FeetInches class holds distances or measurements...
select one that would BEST prevent the system failure from occurring: A hacker accessed the Website...
select one that would BEST prevent the system failure from occurring: A hacker accessed the Website at Valhalla, Inc. and changed some of the graphics. Confused by these changes, some customers took their business elsewhere. A. Access control software B. Firewall C. Personnel termination control plans D. Personnel selection and hiring control plans E. Continuous data protection F. Rotation of duties and forced vacations Bob Johnson, the company cashier, was known throughout the company as a workaholic. After three years...
Part 1: The amount of time that users of a real estate website spend on the...
Part 1: The amount of time that users of a real estate website spend on the site is believed to be normally distributed. Suppose 20 randomly-selected users of the site were asked how much time they typically spend on the site during the week, and the sample mean was found to be 5.2 hours. (5 pts.) If the population standard deviation is known to be σ=2.8 hours, then What is the point estimate for µ in this problem? Find the...
The number of users of a certain website (in millions) from 2004 through 2011 follows. Year...
The number of users of a certain website (in millions) from 2004 through 2011 follows. Year Period Users (Millions) 2004 1 1 2005 2 6 2006 3 12 2007 4 57 2008 5 144 2009 6 361 2010 7 608 2011 8 846 Using Minitab or Excel, develop a quadratic trend equation that can be used to forecast users (in millions). (Round your numerical values to one decimal place.) Tt = Consider the following time series. Quarter Year 1 Year...
This question is the one that was made available to you on the class website so...
This question is the one that was made available to you on the class website so that you could think over your response first. The electroscope was a tool used in the early days of classical physics to explore the way in which charges interact, enabling measurement of small forces, and establishing Coulomb's law. If there are two balls each the same mass hanging by threads of the same length and equally charged then they repel one another and push...
Web Design ~ An online art gallery website has both free and premium accounts for users....
Web Design ~ An online art gallery website has both free and premium accounts for users. Over the past two years, the percentage of premium accounts has held steady at 35%. Designers have proposed some changes to the premium features but before they invest in the redesign, the website wants to know if the proportion of premium accounts is likely to change. They survey a random sample of 600 users and find that 225 of them say they would purchase...
You operate a travel advisory website and want to give your users advice on airline timeliness....
You operate a travel advisory website and want to give your users advice on airline timeliness. You select three airlines and monitor their delays at 5 airports. You record average delay times for each airline at each airport. THen you run a 2way ANOVA and get the following partial result: ANOVA results Source of Variance SS df MS F Airline 383 Airport    296 Error Total 723 What is the sum of squares for error? WHat are the degrees of...
You operate a travel advisory website, and want to give your users advice on airline timeliness....
You operate a travel advisory website, and want to give your users advice on airline timeliness. You select 4 airlines, and monitor their delays at 5 airports. You record average delay times for each airline, at each airport. Then, you run a 2-way ANOVA and get the following partial Result: ANOVA Results Source of Variance SS df MS F Airline 314 Airport 219 Error Total 621 Step 2 of 7: What are the Degrees of Freedom (df) for the variability...
Funny Family Vids, Inc. is an online website where users can post their funny home videos....
Funny Family Vids, Inc. is an online website where users can post their funny home videos. Some of its users also post copyrighted material belonging to others, however. What is the legal consequence, if a website's user uploads entire movies without permission? a. Neither the website nor its user can be sued for copyright infringement because of fair use. b. The website has the opportunity to remove the infringing material in order to avoid liability. c. The website becomes liable...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT