Page 204 - CISSO_Prep_ Guide
P. 204

activities. A denial of service attack aims at disabling the
            systems or operations of the target. There have been many ways
            to conduct network-based DoS attacks including the Ping of
            Death (a malformed ICMP ping packet), SMURF (a flood of
            ICMP packets), Fraggle (a flood of UDP packets), SYN floods
            (a flood of TCP SYN requests), and NTP (Network Time
            Protocol) floods, to name a few!

            A DoS can also be against other systems or services - for
            example, an organization that is subject to a strike by their staff
            will often find it difficult for other workers or customers to gain
            access to the building.

            A DDoS or Distributed Denial of Service attack is a denial of
            service attack launched from many points at once against a
            target. The use of many systems to attack a target amplifies the
            attack and can be difficult to defend against.


            Botnets

            Botnets, or robotically-controlled networks, are one of the
            largest problems on the internet today. A botnet is a collection
            of compromised devices that have been infected with a program
            that allows them to be accessed and manipulated remotely. The
            infection may be through a ‘zombie’ that sits on a victim’s
            machine and listens on an Internet Relay Chat (IRC) channel or
            through a program such as Zeus (also known as ZBOT) or
            Citadel that allows an attacker to read everything being done on
            the victim’s machine. ZBOT is often used in financial fraud,
            whereas many zombies are used in the distribution of spam or
            malicious content.
   199   200   201   202   203   204   205   206   207   208   209