Different Types Of DOS Attacks And Their Difference

Asked By 0 points N/A Posted on -

What are the different types of DOS attacks? Are they the same? In what way do they differ from each other?

Answered By 0 points N/A #182408

Different Types Of DOS Attacks And Their Difference



There are two basic types of DOS attacks:

1. Application layer attack: It is a layer 7 attack that aims at overloading a server by sending many requests simultaneously requiring handling and processing.

2. Network layer attack: They are layer 3-4 attacks that aim at clogging the pipelines that connect our network. They are used to deny access to our servers and also cause severe operational damages.

Answered By 569090 points N/A #182409

Different Types Of DOS Attacks And Their Difference


DoS attacks can be generally separated into networking-related attacks and OS-related attacks based on the www.irchelp.org article. For OS-related attacks, older Mac OS and Microsoft Windows 95/Microsoft Windows NT are vulnerable. However, most vendors of operating systems have already fixed the problem in their latest versions and provide patches for their vulnerable operating system.

For networking-related attacks, there are countless security holes which an opponent can take advantage of to initiate a DoS attack like for example the SYN flooding, as pointed out in Steven Bellovin's famous paper "Security Problems in the TCP/IP Protocol Suite". The types of DoS attack include the following:

  • * Bonk/boink/newtear/teardrop2 – is a type of DoS attack resulting in blue screen freeze and crash.
  • * Ping of Death – is a type of attack that takes advantage of a known bug in the implementation of TCP/IP. The attacker utilizes the ping utility to structure an IP packet that surpasses the limit 65,536 bytes of data permitted by the IP specification. When systems received a massive packet, they may reboot or crash.
  • * Teardrop – is a type of DoS attack that exploits a flaw in the reassembly of IP packet fragments. The attacker generates a series of IP fragments with overlapping offset fields. When systems attempt to reconstruct the deformed fragments, they will reboot or crash.
  • * SYN flooding – an attack that manipulates the 3-way handshaking of TCP. A flood of SYN packets is sent to the targeted system along with spoofed source address until the system exhausts all slots in its backlog queue.
  • * Land – is a type of DoS attack very identical to SYN flooding. SYN packets are flooded to the network by the enemy along with spoofed source IP address of the targeted system.
  • * Smurf – is a new type of DoS attack where the smurf attacker cripples the router with ICMP echo request packets.
  • * Snork – is a type of DoS attack against Windows NT RPC service. It permits the enemy with least resources to cause a remote Windows NT system to eat one hundred percent (100%) CPU usage for an indeterminate period of time.

Login/Register to Answer

Related Questions