Friday, July 26, 2019

Penetrating testing techniques Research Paper Example | Topics and Well Written Essays - 1500 words

Penetrating testing techniques - Research Paper Example This article will analyze some of these modern computer attacks, how they happen and ways of mitigating them. A DDoS attack is an ill attempt to make a network or server resource unavailable to users, often through disrupting or suspending the services of a connected host from the internet. The DDoS attack can be achieved by two main ways. First, the attacker, using malware or Trojan can take over several computers on the internet, creating a botnet in the process. Secondly, the attacker then controls the affected computers and makes them attack simultaneously the target thus achieving their initial goal (Gu & Liu, 2007). The DDoS attacks can be resolved, mainly through the incorporation of blocking and detection mechanisms, that apply even during the spoofed attacks, when attacker profiles and identities are constantly changing. Others include, giving more complete capabilities of verification than either IDS signatures or static routers filters can provide. Prevent dependence on configuration changes or network device resources. In-built intelligence processes being infused with only contaminated traffic packets that would guarantee minimum scaling costs and maximum reliance. Implement procedures for communication standards to help guarantee maximum reliability and interoperability. Blocking and identifying individual spoofed packages to guard genuine business transactions (Patel & Patel, 2014). TCP session, or session hijacking, is generally a means of taking over a session of a web user by obtaining surreptitiously the session Id and pretending to be the official session user. Once accessed, the invader can pretend to be the official user and freely access and manipulate data as they please. Hackers popularly use routed IP packets from the original source to hijack a session. Through re-routing the communication to go through his computer, he can communicate with the different machines simultaneously. An effective example of such

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.