Denial of Service (DOS): It is an Attack on the Availability of network resources
Ways to Intitiate the DOS are :-
Distributed Denial of Service Attack (DDoS): When a attacker uses a convenient method to distribute trojan horses to as many target machine possible
Security
Intrusion Detection System (IDS) : It is a device that monitors and deduct the suspicious events
Terminology used in IDS
Ways to Intitiate the DOS are :-
- Transmission Failure
- Traffic Redirection
- DNS Attack
- Connection Flooding
Types of Connection Flooding Attack
- ECHO Chargen
- Ping of Death
- Smurf Attack
- SYN Flood
- Teardroop
Distributed Denial of Service Attack (DDoS): When a attacker uses a convenient method to distribute trojan horses to as many target machine possible
Security
Intrusion Detection System (IDS) : It is a device that monitors and deduct the suspicious events
Terminology used in IDS
- Anomaly
- Misuse
- Intrusion
- Audit
- Profiling
- Detect Attach properly
- Monitor System Effectively with minimal resources
Response of IDS
- Monitor the Attack
- Protect system and reduce exposure
- Alter a human
No comments:
Post a Comment