Sunday, October 6, 2019

Computer Science Essay Example | Topics and Well Written Essays - 500 words

Computer Science - Essay Example This often attacks the routers, servers, and firewall processing resources and thus limiting them. Normally, this type of DDoS attacks sent a lot of data which leads to an overload making the network bandwidth to be depleted. There is a reduction in the quality of service when there is an overload attack in a system. This is because the normal access is tempered with. This kind of attacks often sent large traffic attacks in form of TCP, UDP and other ICPM.Often people use technology forgery to escape the system monitoring. When the attacks are mixed with the malware exploitation, they cause leaking of the information and this may be dangerous. This illegal activity of information leakage will occur while fighting the DDoc attacks. This is vital as it is used in the financial institutions to prevent breaches and leakages of the information. Though the attackers may not be many, this attack is taken for specific roles such as canceling fraudulent transactions or accesses a vital database. (Chai, 2013)This often involves targeting application layer of OSI model.Normally, application layer data is sent to the attackers to disable their functions. Here, there is the involvement of a machine which in most cases are the agents. When the orders are received from the master machine which is controlled by the attacker, this agent will be involved in remitting the packets to a host who is a victim of the attack. The agents and master will then generate an actual attack message instructing the modus operandi to attack the network victim.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.