Network and Data Security for Non-Engineers by Frank M. Groom Kevin Groom & Stephan S. Jones

Network and Data Security for Non-Engineers by Frank M. Groom Kevin Groom & Stephan S. Jones

Author:Frank M. Groom, Kevin Groom & Stephan S. Jones
Language: eng
Format: epub
Publisher: CRC Press


Figure 14.4 Two main goals of issuing denial-of-service attacks.

Stopping Services

Locally, these attacks are focused on process crashing and forcing system reconfiguration. Remotely, the attacks are predominantly focused on sending malformed packets that crash buggy services.

Exhausting Resources

Hackers try to send spawning process commands to fill the process table. Additionally, hackers tend to fill up the whole file system and saturate the communications bandwidth. Remotely, packet floods are used to block the network from utilizing its resources properly.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.