ch08 - Computer Security: Principles and Practice Chapter 8...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 Chapter 8 Denial of Service Denial of Service
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Denial of Service denial of service (DoS) an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space attacks network bandwidth system resources application resources have been an issue for some time
Background image of page 2
3 Classic Denial of Service Attacks can use simple flooding ping from higher capacity link to lower causing loss of traffic source of flood traffic easily identified
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Classic Denial of Service Attacks
Background image of page 4
5 Source Address Spoofing use forged source addresses given sufficient privilege to “raw sockets” easy to create generate large volumes of packets directed at target with different, random, source addresses cause same congestion responses are scattered across Internet real source is much harder to identify
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 SYN Spoofing other common attack attacks ability of a server to respond to future connection requests overflowing tables used to manage them hence an attack on system resource
Background image of page 6
7 TCP Connection Handshake
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 SYN Spoofing Attack
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/05/2011 for the course CS 2105 taught by Professor Ana during the Fall '09 term at National University of Singapore.

Page1 / 22

ch08 - Computer Security: Principles and Practice Chapter 8...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online