Monday, December 29, 2014

Information Security: Denial of Service (DOS) Attack and Intrusion Deduction System

Denial of Service (DOS): It is an Attack on the Availability of network resources

Ways to Intitiate the DOS are :-

  1. Transmission Failure
  2. Traffic Redirection
  3. DNS Attack
  4. Connection Flooding
Types of Connection Flooding Attack

  1. ECHO Chargen
  2. Ping of Death
  3. Smurf Attack
  4. SYN Flood
  5. Teardroop

Distributed Denial of Service Attack (DDoS): When a attacker uses a convenient method to distribute trojan horses to as many target machine  possible 

Security

Intrusion Detection System (IDS) : It is a device that monitors and deduct the suspicious events

Terminology used in IDS

  • Anomaly
  • Misuse
  • Intrusion
  • Audit
  • Profiling


Goals of Intrusion Deduction System


  • Detect Attach properly
  • Monitor System Effectively with minimal resources
Response of IDS
  • Monitor the Attack
  • Protect system and reduce exposure
  • Alter a human


No comments:

Post a Comment