Open Access Open Access  Restricted Access Subscription Access

Os Specific Host Based DoS Attacks


Affiliations
1 Department of Computer Engineering, Punjabi University, Patiala, India
 

The most hardest and common problem in today's Internet is the Denial of Service (DoS) attack. These attacks deprived off the resources and the services of the user connected over Internet within a short period of time and with very ease. The effect of the attack is depend upon the attacker's will, so it is easy for an attacker to organize an attack with destructive results. These attacks have severe impact on the operating system (OS) of a system. So the operating system must protect itself from the security gaps. In client-server communication, a DoS attack may be lanced by sending many useless requests to the server. These useless requests results in depriving off server's resources and stopping it from responding legitimate client requests. In this paper, the approach used to prevent these attacks and some OS specific host based attacks are discussed.
User
Notifications
Font Size

Abstract Views: 204

PDF Views: 0




  • Os Specific Host Based DoS Attacks

Abstract Views: 204  |  PDF Views: 0

Authors

Harleen Kaur
Department of Computer Engineering, Punjabi University, Patiala, India
Harmandeep Singh
Department of Computer Engineering, Punjabi University, Patiala, India

Abstract


The most hardest and common problem in today's Internet is the Denial of Service (DoS) attack. These attacks deprived off the resources and the services of the user connected over Internet within a short period of time and with very ease. The effect of the attack is depend upon the attacker's will, so it is easy for an attacker to organize an attack with destructive results. These attacks have severe impact on the operating system (OS) of a system. So the operating system must protect itself from the security gaps. In client-server communication, a DoS attack may be lanced by sending many useless requests to the server. These useless requests results in depriving off server's resources and stopping it from responding legitimate client requests. In this paper, the approach used to prevent these attacks and some OS specific host based attacks are discussed.