Preview

Network Security

Powerful Essays
Open Document
Open Document
6846 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security
Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.

Trends in Denial of Service
Attack Technology
CERT® Coordination Center
Kevin J. Houle, CERT/CC
George M. Weaver, CERT/CC
In collaboration with:
Neil Long
Rob Thomas

v1.0
October 2001

CERT and CERT Coordination Center are registered in the U.S. Patent and Trademark Office.
Copyright 2001 Carnegie Mellon University

1

Abstract

In November of 1999, the CERT® Coordination Center (CERT/CC) sponsored the Distributed Systems Intruder Tools (DSIT) Workshop where a group of security experts outlined the emerging threat of distributed denial of service
(DDoS) attack technology. Since then, denial of service (DoS) attack technology has continued to evolve and continues to be used to attack and impact Internet infrastructures. Advances in intruder automation techniques have led to a steady stream of new self-propagating worms in 2001, some of which have been used to deploy DoS attack technology. Windows end-users and Internet routing technology have both become more frequent targets of intruder activity. The control mechanisms for
DDoS attack networks are changing to make greater use of Internet Relay Chat
(IRC) technology. The impacts of DoS attacks are causing greater collateral damage, and widespread automated propagation itself has become a vehicle for causing denial of service.
While DoS attack technology continues to evolve, the circumstances enabling attacks have not significantly changed in recent years. DoS attacks remain a serious threat to the users, organizations, and infrastructures of the Internet.
The goal of this paper is to highlight recent trends in the deployment, use, and impact of DoS attack technology based on intruder activity and attack tools reported to and analyzed by the CERT/CC. This paper does not propose solutions, but rather aims to serve as a catalyst to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    recommendations. The document dates back to 1971, it proves that this type of issue should have…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    are suitable and eligible. These documents are listed in Appendix A which is separate to…

    • 1604 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Source: Susan Myra Kingsbury, ed., The Records of the Virginia Company of London (Washington, D.C., 1906-1935), Vol. I, pp. 256-57.…

    • 396 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    DoS/DDoS attack from the WAN/Internet: buy more bandwidth, denial of service, and good load balancing.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Document3

    • 751 Words
    • 4 Pages

    | |Example for Doc 3: Harry J. Carman and Harold C Syrett. A History of the American People. 1952. | |…

    • 751 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    1. How would you describe what this document is? What was its purpose? What function did it serve?…

    • 2170 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Our primary focus with this paper was to research and assess the issues associated with the specific emerging technology.…

    • 7281 Words
    • 30 Pages
    Good Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Satisfactory Essays

    TDA 3.1

    • 40383 Words
    • 425 Pages

    any material from this document; however, CACHE does not accept any liability for any incomplete or…

    • 40383 Words
    • 425 Pages
    Satisfactory Essays
  • Better Essays

    United States. The Library of Congress. Bill Summary and Status (2011-2012) S. 3501. 2012. Web. <http://thomas.loc.gov/cgi-bin/bdquery/z?d112:s.03501:>.…

    • 1470 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    In this section I needed to add a statement like your problem is... I recommend that you... Other than that and some proof reading Dr. Cross didn't have any other comments.…

    • 1712 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Learning and Young Children

    • 61596 Words
    • 247 Pages

    any material from this document; however, CACHE does not accept any liability for any incomplete or…

    • 61596 Words
    • 247 Pages
    Powerful Essays

Related Topics