6.3 Assignment 5
Student’s Name
Instructor’s Name
Course Number
Due Date
6.3 Assignment 5
1.
Ip sweep attack refers to a category of attack that usually happens when the attacker sends pings or ICMP echo requests to numerous destination addresses. In contrast, portsweeep attack refers to a scenario where numerous hosts are usually scanned for a given listening port.
A buffer overflow attack operation takes place when a given program attempts to fill the memory buffer or the memory block with additional data more than the capacity the buffer was recommended to carry.
The DoS attacks refer to attacks that normally shuts down a network or a machine, turning it inaccessible to its users. They usually execute this action through overfilling the targets with traffic or by sending information triggering a crash. An example of this attack is the Buffer overflow attack. On the other hand, DDoS attack refers to malicious trials aimed at disrupting targeted traffic or servers or a network by overwhelming the server and the encompassing infrastructure with overfill of internet server or traffic. An example of this attack is SYN flooding and UDP flooding.
3.
Routing attacks refers to attacks that usually takes advantage of the protocols vulnerabilities, the weak authentications, and the inconsistencies experienced in the router software. Two examples of routing attacks are Hit and Run (HAR) or the Persistent Attacks (PA).
A characteristic of the HAR attack is that they are usually easy to spot since the attacked router will start by showing unusual activities external to the normal routine. While PA attacks are usually persistent in nature.
4.
The countermeasures that would be recommended as a defense against these types of network activity include creating a strong network change regularly and network password (Attacks”, 2020). Secondly, the countermeasure can be achieved through deleting suspicious don’t clicks and emails. Other measures include the application of data encryption and antivirus software.
References
Attacks”, “. (2020, April 3). TYpes of network attacks and prevention techniques. Cyber Threat: https://cyberthreatportal.com/types-of-network-attacks-and-prevention/