Question

a) What is the purpose of a denial-of-service attack? b) Which programs directly attack the victim...

a) What is the purpose of a denial-of-service attack?

b) Which programs directly attack the victim in a distributed denial-of-service attack?

c) What is a collection of compromised computers called?

d) What is the person who controls them called?

e) To what computer does the attacker send messages directly?

f) What are the implications of the fact that bots can be updated?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) What is the purpose of a denial-of-service attack?

Denial-of-Service (DoS) as the name implies is a kind of attack to make the services of a computer or a network inaccessible to the authentic user.

  • The attacker makes use of flooding messages or signals in the network so that the system ends up with a crash or denying the service requests by the intended users.
  • DoS attackers mainly target web servers of popular organizations such as financial, governmental, media companies or other service providers so that their clients will not able to do business and companies will face problems.

b) Which programs directly attack the victim in a distributed denial-of-service attack?

The programs that directly attack the victim are called Bots

  • A bot is a term used as the short name for a robot, mainly given to a computer affected by the malware program.
  • in DoS attacks, there could be a single machine often connected multiple devices they trigger the flooding messages across the network using a sophisticated program.

c) What is a collection of compromised computers called?

Collection of compromised computers are called Botnets

  • in DoS attacks, there could be a single machine, often connected multiple devices they trigger the flooding messages across the network using a sophisticated program.
  • Collection of compromised computers are called Botnets

d) What is the person who controls them called?

The person who controls them called Botmaster

  • Botmaster controls the botnet
  • Botmaster is able to reprogram the botnet programs that make the bots more flexible.

e) To what computer does the attacker send messages directly?

The DoS attacker sends the message directly to the victim's compromised computer, that is the bot.

f) What are the implications of the fact that bots can be updated?

  • Bots are the computers that the attacker directly communicate with.
  • These bots are programmed with sophisticated programs to conduct DoS attacks
  • The Botmaster is having the full authority over the bots so that he will be able to remotely reprogram the bots as he needed.
  • This will help when the authorised user takes actions to prevent DoS attack the attacker will be able to take countermeasures using the remote reprogramming.
  • This makes bots more flexible and they can be updated as well.
Add a comment
Know the answer?
Add Answer to:
a) What is the purpose of a denial-of-service attack? b) Which programs directly attack the victim...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Description: In this assignment, you will be launching a denial of service attack on a web...

    Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...

  • Differences between DDoS, TDoS and PDoS: - Denial of Service costs the global economy billions of...

    Differences between DDoS, TDoS and PDoS: - Denial of Service costs the global economy billions of dollars. The economy is the soul of our society and its collapse will surely change the way humanity exists today. The three main goals of IT security are availability, confidentiality and integrity. Here I’m going to discuss about DDoS, TDoS and PDoS. Distributed denial-of-service (DDoS): - DDoS attack involves several connected online devices, known collectively as botnets, that serve to flood a target website...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • THE CASE Sameer Arkell and Marcy Haddow had worked for Crowdsite, an international computer repair service,...

    THE CASE Sameer Arkell and Marcy Haddow had worked for Crowdsite, an international computer repair service, for ten years. It therefore came as a surprise when they both received lay-off notices on a Friday afternoon early January 2015. Both were given severance packages that matched their seniority so they decided that this might be the catalyst to launch their own business repairing computers and related equipment for businesses in their community. Both were single and had no children, so no...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

  • In Java(using BlueJ) Purpose Purpose is to practice using file input and output, and array list...

    In Java(using BlueJ) Purpose Purpose is to practice using file input and output, and array list of objects. Also, this lab specification tells you only what to do, you now have more responsibility to design how to do it. Problem description You are given a text file called 'Students.txt' that contains information on many students. Your program reads the file, creating many Student objects, all of which will be stored into an array list of Student objects, in the Students...

  • In Java(using BlueJ) Purpose Purpose is to practice using file input and output, and array list of objects. Also, this lab specification tells you only what to do, you now have more responsibility to...

    In Java(using BlueJ) Purpose Purpose is to practice using file input and output, and array list of objects. Also, this lab specification tells you only what to do, you now have more responsibility to design how to do it. Problem description You are given a text file called 'Students.txt' that contains information on many students. Your program reads the file, creating many Student objects, all of which will be stored into an array list of Student objects, in the Students...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT