Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are cyber threats that overload a computer system or network, rendering it unable to provide services or causing it to cease operations. The most basic form is DoS, which exploits vulnerabilities in the TCP protocol, followed by DDoS – a distributed denial of service attack, and recently, DRDoS – Distributed Reflection Denial of Service attacks. DNS cache poisoning is a technique that deceives a DNS server into believing it has received trustworthy information. Once the DNS server is compromised, the information is cached and subsequently affects users of that server. |
Despite the increasing prevalence of viruses, 90% of businesses assert that DDoS attacks are the most troublesome and frequently encountered issue in companies.
The results revealed that the most common attack method is DDoS through UDP and TCP SYN packets from compromised computers (often referred to as zombies). The next two threats are malware-laden worms and DNS poisoning. However, in terms of potential risk level to companies, network worms remain the top threat.
Although these attacks have been around for several years, only 29% of ISPs have implemented automated methods for detecting and preventing denial of service attacks. The majority only recognize issues when a customer reaches out for assistance.
The primary means of countering DDoS attacks currently remains the use of Access Control Lists (ACLs), which, on the other hand, can also block legitimate network access. The motivations behind executing denial of service attacks range from extortion to corporate sabotage, and even espionage…
T.N. (according to TechWorld)