Types of Network Attack :Denial of Service , Distributed Denial of Service
- by Sanjeev-
- Sep 13, 2019 19:22
In today’s time, the internet is an essential part of our daily lives and a world without it is unimaginable since we are dependent on it for everything from our work to our daily entertainment. Many of us do not realize it but the internet is not an entirely independent entity, in order to function, it needs a network. The fact that the internet is not entirely safe is not hidden from the general public.
From time to time we hear stories about internet frauds and some dark tales from the dark web but they are not, as usual, the attacks on the networks that are carried out by the hackers in order to extract sensitive information of the users and harm them either financially by stealing their money or ruin their public image by leaking their personal things.
As technology progresses toward advancement, hackers are becoming more and more ruthless and clever. The topic of cybersecurity is trending and new solutions are being tried to save the network from these recurring attacks though with a little less success than we’d like to achieve. If the information is monitored and security compromised, it is a passive attack. If it is destroyed, we may call it an active attack.
There are many types of network attacks:
• Denial of Service (DoS) – in a DoS attack, a hacker can easily deny the services of a computer or network to the original user. The functions of this attack include diverting the attention of internal system staff, flooding the traffic in to cause system shutdown, etc. The percentage of this kind of attack in the overall scenario is 15-16 %. SYN attack is included in this were a using a TCP/IP protocol, victim’s device is flooded with SYN requests.
• Distributed Denial of Service (DDoS) – in this attack a victim is simply attacked by more than one source. The victim's computer is flooded with traffic sent by multiple devices and may cause a shutdown.
• Sniffer – a sniffer attack is effective on a data or network packet which can be read using either an application or a device. Risk of a sniffer attack is higher if the packets are not encrypted. Even they can be accessed if the attacker has the access key.
• Man-in-the-Middle – this kind of attack occurs over communication between two-person over the internet where the attacker can disguise themselves as one of them to get personal information that can be used for their benefit. • Malware – these type of attack is similar to the attacks on a human body by outside viruses.