Here is the synopsis of our sample research paper on OVERVIEW: DENIAL OF SERVICE ATTACKS. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This paper presents an overview of denial of service attacks (DDoS), what they are, what their effects are and how they can be prevented. Bibliography lists 6 sources.
Page Count:
6 pages (~225 words per page)
File: D0_MTdosatt.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
disgruntled people, can cripple and take down a huge network system quickly. Horror stories abound of huge businesses such as Yahoo.com and Amazon.com crippled for several hours while worms and
viruses munched through their systems. Denial of service attacks (better known as DDoS attacks) are more common than wed like to think,
and can end up crippling computer network systems and providing major challenges for companies. The most recent DDoS, called Mydoom, spread through networks during the early part of 2004, effectively
shutting down systems and eating up bandwidth. Last summer, another DDoS, Sobring, did the same thing, creating havoc among many network systems and causing businesses valuable time in correcting the
problem. In a typical DOS or DDoS Attack, the "intruder" relies on a virus or worm to install whats called a "demon"
on the victims computers (Mikusch, 2003). Then what happens is that these computers are technically turned into zombies (Mikusch, 2003). These zombies (also known as "system agents" or "services" in
Windows parlance) re small programs that run in the background of computers and are specifically programmed to carry out tasks in response to specific events or times (Mikusch, 2003). In
the case of DDoS attacks, the demons are programmed to do certain tasks in response to signals from intruders (Mikusch, 2003).
In a typical attack, these zombies gang up on the computers system, end up flooding its resources, and shutting it down (Mikusch, 2003). There are three ways in which DDoS
can impact networks: An intruder can instruct zombie computers to send large numbers of data packets to a victims computer, which uses
...