• Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

What is denial of service attack?

 
Gurumurthy Ramamurthy
Ranch Hand
Posts: 273
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi Guys,

If you know the answer, pls. let me know.

Thanks
 
Steven Bell
Ranch Hand
Posts: 1071
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Often called a DNS attack. You basically pound a server with requests until it can't handle any more and is unable to process legitimate requests.
 
Gurumurthy Ramamurthy
Ranch Hand
Posts: 273
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
ok, if this is the case, what exact we can deduce from the following sentences. This is taken from Mark Cade book about the applet security.

"If an applet could make arbitrary connections to any hosts, then applets could be used as the origin for denial of service attacks against other systems."

Do you mean that if an applet is given permission to connect to any other network, the applet can very easily prove that it did not make an effort to attack some services on the server it connected? (it can deny the attack)

Thanks
 
Steven Bell
Ranch Hand
Posts: 1071
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
I think the point is that if you had a high traffic web site with an applet on it and that applet constantly sent requests to, for example, MS's web site. You could have a few hundred computers slamming MS's web site.
 
Gurumurthy Ramamurthy
Ranch Hand
Posts: 273
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
awesome explanation...I got it. Thanks a lot.
 
Stan James
(instanceof Sidekick)
Ranch Hand
Posts: 8791
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Steve Gibson at grc.com was a victim of DoS and wrote a wonderful report of how he responded with some pretty amazing reverse hacking. It's worth a browse if you're interested in this kind of thing.

2001 Attack

2002 Attack
[ March 11, 2005: Message edited by: Stan James ]
 
Udegbunam Morah
Ranch Hand
Posts: 36
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Steven, that's a good explanation. Can you give any production environment where such can be experienced?

Thanks.
 
Steven Bell
Ranch Hand
Posts: 1071
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Well, it actually can't be experienced. Applets are only allowed to send requests to the server the came from. The DNS attack is one of the reasons behind that security policy.

I guess you could set up an applet to DNS yourself.
 
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic