Study On The Different Computer Based Attacks Computer Science Essay


This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

A Denial of Service (DOS) attack attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts, or other services that rely on the affected computer.

Denial of Service (DOS) attack has become very common on the Internet because, they are much easier to accomplish than remotely gaining administrative access to a target system.

DOS attacks can be classified as logic attacks and resource exhaustion flooding attacks. Logic attacks are used to cause security vulnerabilities, to crash a server, or to reduce performance. Resource exhaustion flooding attacks cause the server's or network's resources to be consumed to the point where the service is no longer responding or the response is reduced.

These are a few of the classic denial of service attacks. Most of these rely upon weaknesses in the TCP/IP protocol. Vendor patches and proper network configuration have made most of these Denial of Service attacks difficult or impossible to accomplish.

Flood Attack:

The flood attack is the earliest form of denial of service attack. In this attack, the attacker simply sends more traffic than the victim could handle. This requires the attacker to have a faster network connection than the victim. This is the lowest-tech of the denial of service attacks, and also the most difficult to completely prevent.

Ping of Death Attack:

The ping of death was simply sending ping packets larger than 65,535 bytes to the victim. The Ping of Death attack relied on a bug in the Berkeley TCP/IP stack which also existed on most systems which copied the Berkeley network code. This denial of service attack can be performed with simple one line code.

Ping -l 86600

This attack was later prevented by operating system developers by limiting the packet size sent to 65,500.

SYN Attack:

In a SYN attack, the attacker floods the target with SYN messages spoofed to appear to be from unreachable Internet addresses. This fills up the buffer space for SYN messages on the target machine, preventing other systems on the network from communicating with the target machine.

Teardrop Attack:

The Teardrop Attack uses IP's packet fragmentation algorithm to send corrupted packets to the victim machine. This confuses the victim machine and may hang it.

Smurf Attack:

In the Smurf Attack, the attacker sends a ping request to a broadcast address at a third-party on the network. This ping request is spoofed to appear to come from the victims network address. Every system within the broadcast domain of the third-party will then send ping responses to the victim.

Distributed Denial of Service (DDOS) attacks

A Distributed Denial of Service (DDOS) attack is a denial of service attack which is performed from a large number of locations across the network. DDOS attacks are usually performed from a large number of compromised systems. These systems may have been compromised by a Trojan horse or a worm, or they might have been compromised by being hacked manually. DDOS attacks are the most dangerous attacks because they are very difficult to defend.


The frequency and sophistication of Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks on the internet are rapidly increasing. The companies and users are desperately trying to prevent these attacks. The threat posed by these attacks has led to several prevention mechanisms. Each prevention mechanism has its advantages and disadvantages over the others. This paper discusses about the DOS attacks and prevention mechanisms under different environments and proposes a best suited prevention technique for each environment.

In the last few years, there was an increase in sophisticate automated attacking techniques. The fully functional attack software's are made available on the internet, which can even be used by novice users without much knowledge to launch large scale attacks. By using fast spreading worms, the targeted networks are infected very quickly. To mitigate these attacks in minutes, the network managers should use semi-automated prevention mechanisms. To develop these semi-automated mechanisms, the developer should use the appropriate prevention mechanism for each environment.

As seen in the figure below, the attack size of DDOS attacks has grown through years ranging from 400 Mbps in the year 2002 to 49 Gbps in the year 2009. Every year majority of security threats are posed by DOS attacks.

Worldwide Infrastructure Security Report taken from Arbor Networks, Inc. [6]

Writing Services

Essay Writing

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.