Cybersecurity Ddos
Cybersecurity Ddos
By
Gowtham Manivel
Dos Attack
● Browser Redirection
● Closing Connection
● Data Destruction
● Resource Exhaustion
Browser Redirection
Closing Connection
Data Destruction occurs when the hacker destroys the resource by making it
unavailable for usage. Resources get deleted, or the hacker might overwrite
the data.
Resource Exhaustion
Protocol Based attacks consume vital resources of the target server and
exhaust the load balancers and firewalls that protect the system against
DDoS attacks.
Fragmentation Attacks
● A DoS attack involves a single ● A DDoS attack involves various devices, often
device or more devices. compromised by malware, working together to
launch the attack.
● DoS attacks are not so ● DDoS attacks are typically more sophisticated
sophisticated and can not cause and can cause more damage as they involve
much damage to the devices. many devices and a volume of traffic.
● DoS attacks are easier to mitigate, ● DDoS attacks are hard to mitigate, as the
as the attack does not get attack gets distributed across a large number
distributed across different of devices.
devices.
● DoS attacks can be prevented ● DDoS attacks can be more difficult to prevent,
easily, as they do not involve as they often involve compromised devices
compromised devices. that are not controlled by the victim.
● DoS attacks can result in lost ● DDoS attacks can result in lost revenue,
revenue and damaged damaged reputation, and increased costs for
reputation. security and recovery.
● DoS attacks often require less ● DDoS attacks often distract or divert attention
attention than DDoS attacks. away from other malicious activities, such as
data theft or ransomware attacks.
Dos Attack Ddos Attack