• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

An Introduction to DDoS Distributed Denial of Service Attack

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 3a - Secure Networks Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 11:29 am

    Distributed Denial of Service (DDoS) attack is a network attack that uses client/server technology to unite multiple computers as an attack platform to launch DDoS attacks on one or more targets to exponentially increase the power of the denial of service attack. Here are some basics about DDoS attacks:
    How it works: Attackers typically install DDoS master programs on a computer using a stolen account. At a set time, the master program will communicate with a large number of agents already installed on the network. When the agent receives a command, it launches an attack. Using client/server technology, the master program can activate hundreds of agent runs in a matter of seconds.
    Attack mode: DDoS attacks use a large number of legitimate requests to occupy a large number of network resources to crash the network. The attack mode can be divided into the following types:
    By overloading the network to interfere with or even block normal network communication.
    Overload the server by submitting a large number of requests to it.
    A user is blocked from accessing the server.
    Blocking communication between a service and a specific system or individual.
    Impact and harm: The reason why DDoS attacks can frequently lose contact with websites, service paralysis, causing a huge impact is that it is simple and direct, direct attacks on the underlying connection. For example, if a hacker controls 1,000 machines, each with a bandwidth of 10 gigabytes, then the hacker has the equivalent of 10 gigabytes of traffic. When these machines launch traffic attacks to a website at the same time, the bandwidth of the target website may be occupied instantaneously, resulting in no access. Since the bandwidth scale of the vast majority of domestic websites is about 10M or 100M, enterprises are often helpless in the face of large traffic attacks.
    To prevent DDoS attacks, enterprises and individuals need to take a series of security measures, such as configuring firewalls, limiting access speed, and regularly updating software and patches. At the same time, it is also possible to establish effective defense mechanisms to deal with the increasingly complex threat of cyber attacks by cooperating with professional cyber security companies.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 5:55 pm

    A distributed denial of service (DDoS) attack is a type of network attack in which an attacker uses multiple infected devices (often referred to as a “botnet”) to launch a large number of requests to a targeted website or network resource. The purpose of these requests is to overload the target’s network infrastructure so that it cannot handle requests from legitimate users, resulting in service interruption or performance degradation. DDoS attacks can target a variety of network resources, including websites, servers, and network services. There are various attack methods, including using network bandwidth, consuming target system resources or interfering with network communication.
    1. In the face of DDoS attacks, defensive measures and mitigation strategies should include:
    Traffic monitoring and anomaly detection: Monitor network traffic in real time and use anomaly detection-based systems to identify abnormal traffic patterns.
    2. Multi-layer defense strategy: combines network boundary defense, application layer defense, and data center internal defense measures.
    3. Redundant network architecture: Design a highly redundant and distributed network architecture to ensure that other systems can continue to operate when some systems are attacked.
    4. Attack traffic cleaning: Use a third-party DDoS cleaning service to identify and filter out attack traffic and protect the network from being overwhelmed by attack traffic.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in