Please enable JavaScript.
Coggle requires JavaScript to display documents.
Denial of Service Attacks - Coggle Diagram
Denial of Service Attacks
Threat
A user is denied access to authorized services or data
An attempt to defeat availability
Denial of adequate service
Types
Flooding
Saturate or exhaust the capacity of a critical telecommunications link
Presenting commands more quickly than a server can handle them
Blocked Access
Prevent a service from functioning
Exploit software to cause crash
Interfere with network routing
Manipulate access control data
Access Failure
Hardware and Software fail from time to time
Insufficient Resources
Exploitation of known vulnerability
DOS attacks are often second-level attacks
Physical Disconnection
Countermeasure
Network Monitoring and Administration
Capacity Planning
Load Balancing
Network Tuning
Shunning
Blacklisting
Sinkholing
Intrusion Detection and Prevention System
Intrusion Detection System (IDS)
Types of IDS
Signature-based IDS
Network-based IDS
Heuristic IDS (anomaly based)
Host-based IDS
Intrusion Prevention System (IPS)
Honeypot
Management
Backup
Physical Security
Rendundancy and Server Farms
Planning
Risk Analysis
Disaster recovery planning
Incident response plan
Distributed Denial of Service
Bots
Botnets
Internet Control Message Protocols (ICMP)
Ping
Echo
Destination Unreachable
Source Quench
Types of Attack
Ping Attack
Smurf
Echo-Chargen
Syn Flood
IP Fragmentation
Traffic Redirection