Top 3 Products & Services


Dated: Oct. 27, 2005

Related Categories

Networking In General
Network Security

Common Denial of Service Attacks

Buffer Overflow - Malicious hackers can launch buffer overflow attacks wherein data with instructions to corrupt a system are purposely written into a file in full knowledge that the data will overflow a buffer and release the instructions into the computer's instructions.

Ping of Death - A type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually reassembled. This would effectively cause a buffer overload on the operating system at the receiving end, crashing the system.

Smurf Attack - A type of network security breach in which a network connected to the Internet is swamped with replies to ICMP echo (PING) requests. A smurf attacker sends PING requests to an Internet broadcast address. These are special addresses that broadcast all received messages to the hosts connected to the subnet. Each broadcast address can support up to 255 hosts, so a single PING request can be multiplied 255 times. The return address of the request itself is spoofed to be the address of the attacker's victim. All the hosts receiving the PING request reply to this victim's address instead of the real sender's address.

TCP SYN Attack - In a SYN attack, a sender transmits a volume of connections that cannot be completed. This causes the connection queues to fill up, thereby denying service to legitimate TCP users.

Teardrop - A Teardrop is a type of DoS attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.

  Page 2 of 2
  First | Previous | Next | Last

Now that you've gotten free know-how on this topic, try to grow your skills even faster with online video training. Then finally, put these skills to the test and make a name for yourself by offering these skills to others by becoming a freelancer. There are literally 2000+ new projects that are posted every single freakin' day, no lie!

Previous Article

Next Article

Manikandan's Comment
Thank u very much... cool
24 Mon Sep 2012
Admin's Reply:

 Welcome .. Manikandan..

john gaiya's Comment
it is good to be a computer guru
30 Thu Jun 2011
Admin's Reply:

I once spoke an elite computer security person and asked how did it feel to finally be a guru?
He was a bit perplexed and said, it's hard to come to an understanding that I'm a computer security guru, only because there's so much I still don't know.