{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

ch08 - Computer Security Principles and Practice Chapter 8...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 Chapter 8 Denial of Service Denial of Service
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 Denial of Service denial of service (DoS) an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space attacks network bandwidth system resources application resources have been an issue for some time
Background image of page 2
3 Classic Denial of Service Attacks can use simple flooding ping from higher capacity link to lower causing loss of traffic source of flood traffic easily identified
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
4 Classic Denial of Service Attacks
Background image of page 4
5 Source Address Spoofing use forged source addresses given sufficient privilege to “raw sockets” easy to create generate large volumes of packets directed at target with different, random, source addresses cause same congestion responses are scattered across Internet real source is much harder to identify
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
6 SYN Spoofing other common attack attacks ability of a server to respond to future connection requests overflowing tables used to manage them hence an attack on system resource
Background image of page 6
7 TCP Connection Handshake
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8 SYN Spoofing Attack
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}