Computer Misuse - Denial Service Attack Presentation
Computer Misuse - Denial Service Attack Presentation
Service Attack
By: Alexis Perry
Arianna Edwards
11:11PM
Topics Covered
Denial-of-service attack detection products (they offer DoS detection functions) include:
Intrusion detection systems- Intrusion Detection System (IDS) observes network traffic for malicious transactions and sends
immediate alerts when it is detected.
Intrusion prevention systems- A network security technology that constantly monitors network traffic to identify threats.
Firewalls- A network security device designed to monitor, filter, and control incoming and outgoing network traffic based on
predetermined security rules.
Cloud DDoS Mitigation software is designed to safeguard cloud infrastructures against DDoS attacks and works to maintain
uninterrupted service availability. They will also adeptly identify patterns indicative of DDoS attacks, thereby initiating prompt
responses to deflect potential threats. These include Radware Cloud DDoS Protection Service, A10 Thunder Threat Protection
System, Akamai Prolexic, AWS Shield, and Microsoft Azure DDoS Protection
Methods
of DoS An Amplified Domain System (DMS)
attack is a type of attack where the Application layer attacks, also called
A buffer overflow attack occurs when a
program attempts storing too much