MODULE 6 Flashcards
Backscatter trafficking:
Advertising unused IP addresses to monitor attacks
Categories of resources that could be affected by DoS attacks:
- Network bandwidth
- System resources
- Application resources
Flooding attack types:
- ICMP flood
- UDP flood
- TCP SYN flood
SYN spoofing:
Attacking the ability of a server to respond to connection requests
SIP flood:
Exploiting a single invite request that triggers resource consumption
Amplification attack:
Sending a packet that generates multiple response packets with a spoofed address of the target to intermediaries
SIP stands for _____
Session Initiation Protocol
Reflection attack:
Sending packets to an intermediary with a spoofed address of the target
Ways to identify DoS type of attack:
- Analyze packets
- Filter upstream
- Fix bugs
Application-based bandwidth attack:
An attack that forces a system to execute resource-consuming operations
DoS attack preventions:
- TCP
- CAPTCHAs
- Mirrored servers
- Blocking spoofed addresses
- Blocking suspicious services
- Blocking IP directed broadcasts
IDS stands for _____
Intrusion Detection System
IDS:
A detector of abnormal traffic patterns