Tuesday, May 14, 2019

Detecting preventing or mitigating DoS or Distributed DoS attacks Research Paper

Detecting preventing or mitigating DoS or Distributed DoS attacks - Research Paper ExampleThis process requires a large intercommunicate of computers running malicious program. To acquire the network, the attacker uses software that recruits vulnerable computers (Glen, 2013). That is, the computers with improperly patched antivirus, out of betrothal antivirus and without antivirus (FU, 2012).To recruit utensils into his/her DDoS attack, the attacker may follow several processes. Firstly, the attacker may use a machine infected with malicious programs to search, find, and infect another machine (Patrikakis, Masikos, & Zouraraki, n.d.). The infected machine joins the previous in the haunt of the unprotected machine and infects them. Secondly, the attacker may create a long list of the machine he/she want to recruit before infecting them with the malicious software to make them join his/her army of attacking computers (Glen, 2013 Patrikakis, Masikos, & Zouraraki, n.d.).Notably, mor e or less public servers, when compromised, become effective to the attacker when creating the hit list (Patrikakis, Masikos, & Zouraraki, n.d.). For instance, the attacker may run topological scan where one machine is infected and finds other machine to infect through url it stores (UMUC, 2012). Local subnet examine uses a compromised host to attack another computer within its own network without firewall detection as it uses the information stored in the local addresses (UMUC, 2012). Lastly, permutation scanning infects the machines allocated a regular pseudorandom combination record of IP addresses (Patrikakis, Masikos, & Zouraraki, n.d.). It searches for uninfected machine in the IP addresses and infect it. When it identifies the infected machine, it jumps over it to the uninfected (UMUC, 2012). The process loot when the infected machine finds several infected machines while it scans (Patrikakis, Masikos, & Zouraraki, n.d.).There are various frames used in the wireless network as a way of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.