|
|
Subject:
Denial of service attacks (computing)
Category: Computers > Security Asked by: jamesk1982-ga List Price: $20.00 |
Posted:
31 Jan 2006 12:15 PST
Expires: 02 Mar 2006 12:15 PST Question ID: 439740 |
Determine the differences between a denial of service email attack from a typical denial of service attack on a user/domain to create a definition of a denial of service email attack |
|
There is no answer at this time. |
|
Subject:
Re: Denial of service attacks (computing)
From: flex99279-ga on 01 Feb 2006 09:16 PST |
Types: Bandwidth consumption Network connectivity other types bandwidth consumption - the attacker floods the victim with ICMP packets, and tries to consume all possible bandwidth. (Very Common) Network Connectivity - The attacker tries to connect to the victim in such a way that the connection disables a service. An example would be a connection that never completes, but the service handeling the connection reserves system resources to complete a connection, since the connection never completes, thhose resources are being consumed. From http://whatis.techtarget.com The examples of an email DoS attack Email: -Sending e-mail messages that have attachments with 256-character file names to Netscape and Microsoft mail programs -Sending to a user of the Pine e-mail progam a message with a "From" address larger than 256 characters -A mail server (SMTP/POP etc) can fail if its "mail bombed". This is the act of sending hundreds and thousands of bogus emails in a very short amount of time. |
If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you. |
Search Google Answers for |
Google Home - Answers FAQ - Terms of Service - Privacy Policy |