You are on page 1of 1

In this video, you will

learn to describe how denial of service and distributed denial of service attacks
are carried out. Describe how packet filtering and trace back can
be used to help counter denial of service attacks and the shortcomings
of these measures. One of the major attack scenarios in the cybersecurity world, is
that of the denial
of service or DOS. So this has to do with a flood of maliciously generated packets.
So basically, overwhelm,
swamp the receiver. They spend so much time
handling the incoming packets, and they have no time for other computationally
intensive activity. There is single denial
of service attacks. There's also distributed,
which is DDOS, which talks about
multiple sources. Swamping a receiver. Then distributed attacks are resistant to
single
IP blocking, right? We see that activity
demonstrated in the diagram here on the bottom of page 18. So how to launch a
countermeasure
for that thing out, flooded packets before reaching
the host having a filter. But the problem there, is that you're going
to be filtering out solid and legitimate
packets along with the bad. We're going to talk
about the ability to trace back to
the source of the floods, but this only applies against innocent and
compromised machines. So the idea about dynamic filtering being
able to adjust as the traffic patterns
are realized, plus, the ability to
intelligently filter out packets will help reduce the effect of denial of service.

You might also like