The article below presents an example of DOS (Denial of Service) attack. I liked the article because it presented the flooding attacks from the attacker and the reactive solution from the website as explained similarly in the MIT document. Furthermore, the MIT document has a figure that explains how the attacker can use other computers to attack their destination. The article mentions this type of attack method as a possibility from the attacker because some were stating that it would cost the attacker too money to do this alone - the attacker would need in the range of a 1,000 to 5,000 computers to send that amount of traffic to website's host. The website tried to buy more bandwidth but ended being taken down after 10 minutes. In the end, the hosting company could not sustain the traffic and had to shut down the website.
http://www.infoworld.com/article/03/03/26/HNjazeera_1.html
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment