written 6.8 years ago by | modified 6.6 years ago by |
Subject: Digital Forensics
Topic: System Investigation
Difficulty: Medium
written 6.8 years ago by | modified 6.6 years ago by |
Subject: Digital Forensics
Topic: System Investigation
Difficulty: Medium
written 6.6 years ago by | • modified 6.6 years ago |
DOS: In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
Recovering from DoS Attacks :
Usually, DoS attacks do not involve compromise of the router; rather, they are composed of unwanted packets sent to or through the router. Recovery usually consists of a combination of the following measures:
1)Eliminate listening services.
2) Upgrade software to the latest version.
3) Restrict access to listening services using ACLs.
4)Implement ACLs to limit malicious traffic.