preview

What Is The Distributed Denial Of Service Attack?

Decent Essays

The most popular and dangerous type of attack that happens mostly these days, within the contemporary electronic society, is the distributed denial of service attack (Nemati 2009, 45). This technique is usually defined as specific attacks from multiple wireless sensor networks ends, towards a set of authentic nodes (Malin et al. 2015, 76). Its main intention is exhausting their entire resources. Denial and deception techniques take various forms, most of which depends on the attacker’s objectives and the target system. However, they all have a similar objective, which is attacking the enemy. These assaults tend to influence the system's execution fundamentally consequently bringing about an entire system operation loss of motion (Johnson …show more content…

This data redundancy is mostly caused to the correlation between mining and the sensor observation that inspires in-network data aggregation techniques (Karl, Holger, and Willig 2005, 132). Here, aggregation mostly reduces the network traffic amounts that eventually helps capture or grasp information from the nearby environment. Network nodes can have logical or actual communication with all devices,this communication mostly defines the type of network topology, depending on the application. Sensors are able to be pair with all the topologies types but, in some cases, the sensors may not be appropriate for all the networks. Most logical network topology tends to be defined depending on their logical roles. Centralized configuration techniques are always appropriate for networks whereby the processing power capacity specifically depends on a specific but unique device. The device is responsible for coordination, processing, and management of any information activities that is sensed within the environment. From here, it forwards the grasped information to a sink node. This, therefore, means that the sensors are quite reliable in grasping information (Karl, Holger, and Willig 2005, 105). The advantage of this network arrangement is the centralized configuration allows more energy management and roaming is usually allowed inside the network to facilitate

Get Access