Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Flood servers with data packets??

Posted on 2005-03-07
7
Medium Priority
?
273 Views
Last Modified: 2013-12-04
what is "Flood servers with data packets" meaning from the following??


Types of security attacks
–Denial of service attacks
•Use a network of computers to overload servers and cause them to crash or become unavailable to legitimate users
•Flood servers with data packets??
•Alter routing tables which direct data from one computer to another
•Distributed denial of service attack comes from multiple computers
–Viruses
•Computer programs that corrupt or delete files
•Sent as attachments or embedded in other files
–Worm
•Can spread itself over a network, doesn’t need to be sent
0
Comment
Question by:she1
  • 4
  • 2
6 Comments
 
LVL 14

Expert Comment

by:JohnK813
ID: 13479633
At a basic level:

Information is sent between computers in "data packets" - groupings of 1's and 0's.  If you purposely send more data packets to a server than it can handle - "flooding" it - the server will for all intents and purposes shut down - denying its services to anyone who tries to use it.
0
 
LVL 14

Expert Comment

by:JohnK813
ID: 13479665
Do you need a more in depth/technical description?
0
 

Author Comment

by:she1
ID: 13482613
like the the client request a link from the server, if the requests are more than the server can handle it, it is flooding right? what is the other types of flooding?
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 14

Accepted Solution

by:
JohnK813 earned 120 total points
ID: 13483643
Other examples of flooding:

From this page http://whatis.techtarget.com/definition/0,289893,sid9_gci213591,00.html take a look at the Teardrop attack, and the Smurf attack (also known as the "Ping of Death" attack)

In what you have above, "flooding" just means "sending more information than the server can handle."  For example, if I was to set up a program to send millions and millions of data packets to EE every second, I would overload (or flood) their servers.  Since their servers are flooded, you wouldn't be able to access EE.  I'm denying you the service of getting to EE, and that's why it's called a Denial of Service attack.

I hope this is what you need.  I will be out of town until Friday, so if this doesn't answer your question, feel free to email one of the PE's or delete this question and open a new one (or just wait for me to get back).
0
 

Author Comment

by:she1
ID: 13516788
1. what do you mean "PE's"?

2. thanks, i am concerning how to "to send millions and millions of data packets to EE every second"?

what email address should i send to creat the flooding of address?

thanks a lot
0
 
LVL 14

Expert Comment

by:JohnK813
ID: 13519627
1. Page Editors - See http://www.experts-exchange.com/help.jsp#hi141  For example, gemarti is one of the Page editors for Windows Security.

2. You don't want "to send millions and millions of data packets to EE every second" - it's illegal.  If you did, you'd be shutting Experts-Exchange down, and no one would have access to it.  (It's also not done by email, but that's besides the point.)
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
Is your OST file inaccessible, Need to transfer OST file from one computer to another? Want to convert OST file to PST? If the answer to any of the above question is yes, then look no further. With the help of Stellar OST to PST Converter, you can e…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question