![]() |
|
|
| Subject:
Denial of service attacks (computing)
Category: Computers > Security Asked by: jamesk1982-ga List Price: $20.00 |
Posted:
31 Jan 2006 12:15 PST
Expires: 02 Mar 2006 12:15 PST Question ID: 439740 |
Determine the differences between a denial of service email attack from a typical denial of service attack on a user/domain to create a definition of a denial of service email attack |
|
| There is no answer at this time. |
|
| Subject:
Re: Denial of service attacks (computing)
From: flex99279-ga on 01 Feb 2006 09:16 PST |
Types:
Bandwidth consumption
Network connectivity
other types
bandwidth consumption - the attacker floods the victim with ICMP
packets, and tries to
consume all possible bandwidth. (Very Common)
Network Connectivity - The attacker tries to connect to the victim in
such a way that
the connection disables a service. An example would be a
connection that never completes, but the service handeling
the connection reserves system resources to
complete a connection,
since the connection never completes, thhose resources are being
consumed.
From http://whatis.techtarget.com
The examples of an email DoS attack
Email:
-Sending e-mail messages that have attachments with
256-character file names to Netscape and Microsoft mail programs
-Sending to a user of the Pine
e-mail progam a message with a "From" address larger than 256 characters
-A mail server (SMTP/POP etc) can fail if its "mail bombed". This is
the act of sending hundreds and thousands of bogus emails in a very
short amount of time. |
If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you. |
| Search Google Answers for |
| Google Home - Answers FAQ - Terms of Service - Privacy Policy |