holy poop sticks

Essay by dkd2rB, December 2014

download word file, 4 pages 0.0


Denial-of-Service Attacks and its Future Vulnerability

Dustin K. Davis

Middle Tennessee State University



When protecting computer systems it is critical to consider the idea of what CIA is. CIA stands for confidentiality, integrity, and availability (Kim, David, and Solomon pg. 12). Hackers today are focusing on stopping access to online services and systems by crashing a service through flooding services to the point that it is no longer available. These types of attacks are known as denial-of-service or DoS attacks. DoS attacks can either come from one IP address or from many computers located in various locations, which are known as distributed denial-of-service. Many viewpoints have been shared on the issue of denial-of-service attacks on ways to prevent such attack. Denial-of-service attacks are a major issue now and will continue to be an ongoing problem in the world of IT security.

In this essay I will discuss the history of denial-of-service, the trends in denial-of-service, and the future of denial-of-service attacks.


Distributed denial of service attacks have grown larger in scale, more sophisticated and harder to detect, according to three large technology vendors that have recently published analyses of attacks (Crosman 2014). These programs have existed for several years and are becoming a bigger concern for security as technology advances. What started off as easy-to-use denial-of-service tools that users could download from the Internet has evolved into companies using them against its competitors to take them out of the market. With the overwhelming progress of the Internet during the last decade, a sizable number of vulnerable systems are now obtainable to hackers. The first well-documented DDoS attack occurred in August 1999, when a DDoS tool called Trinoo was deployed in at least 227 systems, to flood a...