Explain a distributed denial of service attack.
What will be an ideal response?
A distributed denial of service (DDoS) attack may take the form of a SYN flood or smurf attack. The distinguishing feature of the DDoS is the sheer scope of the event. The perpetrator of a DDoS attack may employ a virtual army of so-called zombie or bot (robot) computers to launch the attack. Since vast numbers of unsuspecting intermediaries are needed, the attack often involves one or more Internet Relay Chat (IRC) networks as a source of zombies. The perpetrator accesses the IRC and uploads a malicious program such as a Trojan horse, which contains DDoS attack script. This program is subsequently downloaded to the PCs of the many thousands of people who visit the IRC site. The attack program runs in the background on the new zombie computers, which are now under the control of the perpetrator. Via the zombie control program the perpetrator can direct the DDoS to specific victims and turn on or off the attack at will.
PTS: 1
You might also like to view...
A Web browser keeps track of a(n) ________ of pages visited to assist users in recalling the address of pages they have visited
Fill in the blank(s) with correct word
What are the fundamental differences between components as program elements and components as services?
What will be an ideal response?
When using Windows 8 gestures, you need to ________ to zoom in on a document
Fill in the blank(s) with correct word
____________________ is a feature of Visual Studio that displays all allowable entries when you type a period, equal sign, or other special character required in a statement.
Fill in the blank(s) with the appropriate word(s).