but to destabilize the system so that access by legitimate users is restricted. In the end, the network is crashed, and unless it is brought up, no one can access the services again. The other bit that is not present is the Distributed Denial of Service Attack (DDoS). The attack addresses a limitation observed by Trainsignal (2012) that the capacity to launch an attack from a single source is limited. The assumption is that the attackers need more resources to launch a lethal attack. In the DDoS, the attacks are launched from multiple sources, which sometimes are based in different locations and even countries. Paloalto Network (2018) notes that the DDoS attacks are more sophisticated because it is difficult to pinpoint all the sources andswitch them off. Therefore, even if the administrators are alerted of the abnormal traffic, their ability to rectify the situation is limited. Therefore, the attacker has several advantages, includingthe ability to leverage the greater capacity provided by different machines. Hence, the impact of a DDoS can be more severe compared to the Denial of Service (DoS) attack.ReferencesPaloalto Network. (2018). What is a Denial of Service Attack (DOS)?Retrieved from Trainsignal . (2012). Ethical Hacking. Retrieved from ?v=TIjWIBN8wms
Denial of Service Attack4
You've reached the end of your free preview.
Want to read all 4 pages?
Denial-of-service attack, attack, denial of service attack, Paloalto Network