Question
How to write a reply to the following post. A minimum of 150 words 1. Some of the most famous DoS attacks are GitHit, Occupy
How to write a reply to the following post. A minimum of 150 words
1. Some of the most famous DoS attacks are GitHit, Occupy Central, CloudFlare, Spamhaus, and US Banks. GitHit targeted two anti-censorship projects called GreatFire and cnnytimes. It attacked 1.3 terabytes and sent packets at a rate of 129.9 million per second. Occupy Central was an international progressive socio-political movement that expressed opposition to social and economic inequality and to lack "real democracy around the world. The longest attack there has been was over two months. CloudFlare was made a global cloud platform that allows it to protect and accelerate 20 million websites. This company targets small and midsize businesses to large enterprises. There were ever 800 attacks against CloudFlare the number represents more than 40 percent of all unique DDoS targets. Spamhaus is a nonprofit threat intelligence provider and is regularly threatened and attacked. This DDoS attack is large enough to make all their websites go offline and their emails as well. This attack was traced back to a Dutch company name Cyberbunker. The last attack we are going to take ab out is attacks against US banks. Six banks were targeted by this attack those being Bank of America, PNC bank, JP Morgan, Chase Bank, US Bancorp, and Citigroup. This attack created more that 60 gigabytes of traffic per second. There are many ways attacks can be prevented such as choosing the correct deployment mode and choosing the best DDoS protection.
2.
In my research, I have found a lot of DoS attacks on multiple different company servers. Back in February of 2018, GitHub was attacked with what was back then the largest DDoS attack. The traffic for this attack broke records at 1.35 Tbps. This data is massive and any server would have a hard time handling it no matter how powerful it is. "According to GitHub, the attack was traced back to over a thousand different autonomous systems (ASNs) across tens of thousands of unique endpoints." (A10networks.com) A DDoS attack of this size was unheard of at the time, but in early 2019 the record was broke again. In January, a client of Imperva was attacked with a DDoS of 500 million packets of data being sent every second, rendering their computer useless. Then again in April, Imperva was attacked again with a larger amount of data at 580 million packets being sent per second.
The Imperva attack is considered larger because its' data was measured in packet forwarding rate (Smurf attack), while GitHub's attack was measured in bandwidth (SYN attack). Both attacks are DDoS attacks, but one focuses on overloading a network or overloading the number of packets the devices or servers on the network can handle.
There are projected to be 17 million DDoS attacks in 2020. These attacks can be prevented using mirrored packets, flow sampling, and packet analysis.
3. Power-save can sometimes be a lifesaver as we all know. We've all had those nights when our phones are close to running out of battery life and in an attempt to preserve the battery life of your phone pushed the power saving button to help preserve that life for the UBER driver call or for the map app on your phone to help you find where you're going. I didn't know how it worked. I honestly thought the phone just stopped accepting background data into the phones apps. In a sense that is correct. The input of data is slowed down to a buffer and is stored in queues until the phone is taken out of power saving mode. The queues store the data into a "pending tasks" mode. So all the data and information is still being entered, but it is not being processed and delivered until it allowed to by the user of the phone or device.
4. The way that power save works is that the user initiates the throw of the temporarily stored data by pushing an uplink data frame. Basically, the data is queued in order to save power from needing to deliver the data. The way that they are implemented are by having the power save function communicating with the nodes, with help from a radio profile that incorporates WMM. How it extends the battery life is by forwarding UL data and then will stay silent for some time. The nodes buffers frames when active, which will allow for the user to understand the frames that have been temporarily stored.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started