Understanding And Learning How Prevent And Minimize Distributed Denial Of Service

1635 Words7 Pages
Research Paper Your name: Kyle S Willard Your Capella email address: Kwillard1@capella.edu The course number: IT3006 Instructor name: Professor Bob Whale Date submitted: 1.10.2015 Title of your paper: Understanding and learning how to prevent and minimize Distributed Denial of Service Introduction Every day in the Information Technology industry there is an attack that can be so devastating as to completely shut down websites, webservers or even possible someone’s ISP or internet service provider. It is called DDOS or Distributed Denial of Service, it’s a simplistic attack for the most part and just requires moderate resources to accomplish. The attacker hires or creates a botnet and then targets a specific IP and port and then begins to…show more content…
HINT: you may want to also keep a blank template open so you can quickly see the instructions again. Basic description of DoS & DDoS In this initial section we will be learning the basic description of DDoS and what it does. “DDOS is short for Distributed Denial of Service. DDOS is a type of DOS attack where multiple compromised systems -- which are usually infected with a Trojan -- are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. According to this report on eSecurityPlanet, in a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.” (Beal, No Date Found) This in layman’s terms is a nasty way to shut down most small to middle sized websites within minutes and keep them down anywhere from 1 minute to an indefinite period depending upon which style of attack is used and duration of the attack. Very few major websites such as Amazon.com or CNN.com can truly be affected by these attacks due to the extremely high capacity load that they cater to.
Get Access