Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

How to write a reply to the following post. A minimum of 150 words 1. Some of the most famous DoS attacks are GitHit, Occupy

How to write a reply to the following post. A minimum of 150 words

1. Some of the most famous DoS attacks are GitHit, Occupy Central, CloudFlare, Spamhaus, and US Banks. GitHit targeted two anti-censorship projects called GreatFire and cnnytimes. It attacked 1.3 terabytes and sent packets at a rate of 129.9 million per second. Occupy Central was an international progressive socio-political movement that expressed opposition to social and economic inequality and to lack "real democracy around the world. The longest attack there has been was over two months. CloudFlare was made a global cloud platform that allows it to protect and accelerate 20 million websites. This company targets small and midsize businesses to large enterprises. There were ever 800 attacks against CloudFlare the number represents more than 40 percent of all unique DDoS targets. Spamhaus is a nonprofit threat intelligence provider and is regularly threatened and attacked. This DDoS attack is large enough to make all their websites go offline and their emails as well. This attack was traced back to a Dutch company name Cyberbunker. The last attack we are going to take ab out is attacks against US banks. Six banks were targeted by this attack those being Bank of America, PNC bank, JP Morgan, Chase Bank, US Bancorp, and Citigroup. This attack created more that 60 gigabytes of traffic per second. There are many ways attacks can be prevented such as choosing the correct deployment mode and choosing the best DDoS protection.

2.

In my research, I have found a lot of DoS attacks on multiple different company servers. Back in February of 2018, GitHub was attacked with what was back then the largest DDoS attack. The traffic for this attack broke records at 1.35 Tbps. This data is massive and any server would have a hard time handling it no matter how powerful it is. "According to GitHub, the attack was traced back to over a thousand different autonomous systems (ASNs) across tens of thousands of unique endpoints." (A10networks.com) A DDoS attack of this size was unheard of at the time, but in early 2019 the record was broke again. In January, a client of Imperva was attacked with a DDoS of 500 million packets of data being sent every second, rendering their computer useless. Then again in April, Imperva was attacked again with a larger amount of data at 580 million packets being sent per second.

The Imperva attack is considered larger because its' data was measured in packet forwarding rate (Smurf attack), while GitHub's attack was measured in bandwidth (SYN attack). Both attacks are DDoS attacks, but one focuses on overloading a network or overloading the number of packets the devices or servers on the network can handle.

There are projected to be 17 million DDoS attacks in 2020. These attacks can be prevented using mirrored packets, flow sampling, and packet analysis.

3. Power-save can sometimes be a lifesaver as we all know. We've all had those nights when our phones are close to running out of battery life and in an attempt to preserve the battery life of your phone pushed the power saving button to help preserve that life for the UBER driver call or for the map app on your phone to help you find where you're going. I didn't know how it worked. I honestly thought the phone just stopped accepting background data into the phones apps. In a sense that is correct. The input of data is slowed down to a buffer and is stored in queues until the phone is taken out of power saving mode. The queues store the data into a "pending tasks" mode. So all the data and information is still being entered, but it is not being processed and delivered until it allowed to by the user of the phone or device.

4. The way that power save works is that the user initiates the throw of the temporarily stored data by pushing an uplink data frame. Basically, the data is queued in order to save power from needing to deliver the data. The way that they are implemented are by having the power save function communicating with the nodes, with help from a radio profile that incorporates WMM. How it extends the battery life is by forwarding UL data and then will stay silent for some time. The nodes buffers frames when active, which will allow for the user to understand the frames that have been temporarily stored.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Musings On Internal Quality Audits Having A Greater Impact

Authors: Duke Okes

1st Edition

1636941486, 978-1636941486

More Books

Students also viewed these Accounting questions

Question

What are the major tasks in international financial management?

Answered: 1 week ago