A
- Advertising Agencies
- Arabic Sweets,
Pastries, Chocolates
- Architects


B
- Banks
- Beauty


C
- Car Rental
- Coffee Shops
- Commerce
- Consulting
- Craft


D
- Data Processing &
Computer Systems
- Decoration &
Furnishing


E
- Environment / Waste
Management Services
- Express Delivery
- Equipment : food
services, catering,
kitchen, laundry


F
- Financial Services
- Flowers
- Food & Beverage


H
- Hotels 3
- Hotels 4 & 5
- Hotels & Suites


I
- Industry
- Insurance
- Interior Design /
Decoration
- Internet


J
- Jewelleries


L
- Leisure
- Lighting


M
- Medias
- Medical / Technology


O
- Office Equipments /
Electronics
- Outside Decoration


P
- Printing


R
- Real Estate
- Restaurants


S
- Security
- Shop Systems
- Superstores


T
- Telecommunication &
Mobile Phones
- Transport
- Travel Agencies










 


 
Back to archives Back to news
French Version

Denial-of-Service attacks flourish in times of crisis : DoS attacks on the rise

In distributed DoS (DDoS) attacks, hackers use hundreds and sometimes even thousands of previously compromised computer systems to launch assaults against a network or server.

JORDAN (Star) - DoS attacks make computer systems inaccessible by flooding servers or networks with useless traffic so that legitimate users can no longer gain access to those resources.

In distributed DoS (DDoS) attacks, hackers use hundreds and sometimes even thousands of previously compromised computer systems to launch assaults against a network or server.


Part of the problem with DoS attacks is the sheer number of ways in which they can be accomplished.

A DoS attack can be launched to overwhelm a target's Web site, CPU, memory, network bandwidth or routers. It can also work by taking advantage of known flaws in products.


Degradation-of-service attacks are another variation. Such attacks, which are more difficult to detect than other DoS attacks, involve short-lived bursts of spurious traffic directed at a target from multiple sources and are aimed at slowing network performance.

Another problem is that all DoS attacks involve multiple networks and attack sources, many of which have spoofed IP addresses to make detection even harder.


So completely choking off the 'offending' traffic requires network administrators to call upstream service providers, alerting them to the attack and having them shut down the traffic. That process has to be repeated all the way back to every attack source. Several technologies have emerged that enable administrators to detect and respond to DoS attacks far more quickly and effectively than before. But the increasingly sophisticated attack methods and the growing range of systems targeted in DoS attacks continue to pose a challenge.


Amman,13April2002
The Star redaction
The Star


Geography
Some Marks
To see in Jordan
Overview
Fairs & Exhibitions
Useful Addresses
Media of 1stjordan
Impact of 1stjordan
The 'First Jordan' Card
Press Book
Exotica - Flowers - Shopping on line
www.exotica.com.lb
Engineering Consultants Lebanon
www.spectrumlb.com
Nsouli Jewelry Lebanon
www.nsoulijewelry.com
Hotel Beirut Lebanon
acropolishotel.com
Rent Villas France for Holidays, Seasonal Rentals France
www.rent-villas-france.com
Sole Agent for Philips & Whirlpool in Lebanon
www.azelectronic.com
Arab Printing Press Lebanon
www.arab-printing-press.com
Hotel Beirut Lebanon
www.hotelcavalier.com
Arabic Music, CD Arabia
www.cd-arabia.com
Hotels Syria
www.chamhotels.com
Groupe PMR
www.groupe-pmr.com