Distributed Denial Of Service Attack.

DDOS (Distributed Denial-of-Service attack) is making computer resources unavailable to the right recipient of the services. This is done by attackers who crack unprotected computers. Bonet is a group of software agents which run in an automatic manner and independently.


Bonets are internet crackers who looks for systems with no updated security level through scanning a given a specific range of networks. They then manipulate the infected machine so that they can benefit financially and gain recognition. The attackers will use the following protocols and systems to control and update bonnets. Stewart said that “the attackers will use proxy server” (74) the server is an intermediary one that is used to connect with the clients. The proxy server could evaluate the request of the client by using the filter rule.


This rule will help the attackers remain anonymous since the filter rule may require the filtering the IP address.The proxy server may on the other hand alter the details of the client or the server’s response so that the client acts in the benefit of the attacker. It may also cache response from the client so that the response does not reach the remote server and return the content of the request by the client direct.


The attackers could also use shell accounts to conceal their anonymity.The shell accounts are on remote servers and they allow access to software and services. The access to software leads to denial of services which have been paid for or the distribution of illegal software. The other way that attackers use to control and update the bonet is through bouncers. The computer bouncers are used to block access so as to Schiller stated that “to conceal the IP address of the attacker” (273) so as to maintain anonymity.


RE FERENCE.

Wang, C. & Dagon, D. Botnet detection: countering the largest security threat. New York: Springer science business media, 2008

Jakobsson, M. & Ramzan, Z. Understanding new attacks and defenses. California, USA: Sage publication Inc, 2008





Is this your assignment or some part of it?

We can do it for you! Click to Order!



Order Now


Translate »

You cannot copy content of this page