LOT2-Task2-2.pptx - DoS and DDoS Attacks By: Ashish Kunwar...

This preview shows page 1 - 7 out of 7 pages.

DoS and DDoS AttacksBy: Ashish KunwarABC UniversityLOT2 Task 2
Introducing DoS and DDoS attacksDoS and DDoS attacks refrain legitimateusers to access the systemsImpact of DDoS is larger than DoS attacksThe active participant in DDoS attack aremaster, slaves and victim computersThe phases of DDoS attack is MassIntrusion phase and DDoS attack phase
Impact of DDoS attacksUtilizes the resources by consumingbandwidth, CPU time and disk spaceDDoS attack impacts the networkconnectivity by disallowing networkdevices to communicateDDoS attacks misuses internal resourcesby performing attacks against hostDDoS attacks can disrupt settings ofnetwork devices
Protecting Network against DDoSattacks using industry best practice - IDDoS attack is huge threat to University. TheUniversity must have robust network securitysystems installedUse of DDoS scanning tool –igrepUse of DDoS scanning tool –tcpstatUse of DDoS scanning tool –SARAUse of DDoS scanning tool –RID, Find DDoS
End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture