IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Denial-of-Service (DoS) Attacks: Prevention, Intrusion Detection, and Mitigation

Denial-of-Service (DoS) Attacks: Prevention, Intrusion Detection, and Mitigation
View Sample PDF
Author(s): Georg Disterer (University of Applied Sciences and Arts, Germany), Ame Alles (University of Applied Sciences and Arts, Germany)and Axel Hervatin (University of Applied Sciences and Arts, Germany)
Copyright: 2007
Pages: 11
Source title: Cyber Warfare and Cyber Terrorism
Source Author(s)/Editor(s): Lech Janczewski (University of Auckland, New Zealand)and Andrew Colarik (AndrewColarik.com, USA)
DOI: 10.4018/978-1-59140-991-5.ch031

Purchase

View Denial-of-Service (DoS) Attacks: Prevention, Intrusion Detection, and Mitigation on the publisher's website for pricing and purchasing information.

Abstract

Since denial-of-service (DoS) attacks are a major threat to e-commerce, waves of DoS attacks against prominent Web pages gained wide publicity. Typically DoS attacks target Web sites with bogus requests for data in order to slow or block legitimate users from accessing services. In recent years, distributed denial-of-service (DDoS) attacks have been used, which expand the vulnerability of Web sites. Attackers use hundreds or thousands of compromised systems in order to harm commercial Web sites. Attackers use different ways to harm their victims. They manipulate the target networks or target server servers directly by using lacks of protocols and standards to force failures and shut-downs. Or, they try to deplete resources like bandwidth, memory, or processing capacities. Attackers try to hinder or interfere with legitimate users with both strategies. Damages from DDoS attacks can range from inconvenience for legitimate users and customers to a lack of reliability for the site and—finally—to a shutdown of the server and some delay until web services are continued. This is a severe threat for all companies involved in e-commerce, and managing that risk is important to offer secure and reliable services. Therefore, management must take actions of prevention, detection and mitigation in order to protect their Web services.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom