?
Solved

Flood servers with data packets??

Posted on 2005-03-07
7
Medium Priority
?
271 Views
Last Modified: 2013-12-04
what is "Flood servers with data packets" meaning from the following??


Types of security attacks
–Denial of service attacks
•Use a network of computers to overload servers and cause them to crash or become unavailable to legitimate users
•Flood servers with data packets??
•Alter routing tables which direct data from one computer to another
•Distributed denial of service attack comes from multiple computers
–Viruses
•Computer programs that corrupt or delete files
•Sent as attachments or embedded in other files
–Worm
•Can spread itself over a network, doesn’t need to be sent
0
Comment
Question by:she1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
7 Comments
 
LVL 14

Expert Comment

by:JohnK813
ID: 13479633
At a basic level:

Information is sent between computers in "data packets" - groupings of 1's and 0's.  If you purposely send more data packets to a server than it can handle - "flooding" it - the server will for all intents and purposes shut down - denying its services to anyone who tries to use it.
0
 
LVL 14

Expert Comment

by:JohnK813
ID: 13479665
Do you need a more in depth/technical description?
0
 

Author Comment

by:she1
ID: 13482613
like the the client request a link from the server, if the requests are more than the server can handle it, it is flooding right? what is the other types of flooding?
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
LVL 14

Accepted Solution

by:
JohnK813 earned 120 total points
ID: 13483643
Other examples of flooding:

From this page http://whatis.techtarget.com/definition/0,289893,sid9_gci213591,00.html take a look at the Teardrop attack, and the Smurf attack (also known as the "Ping of Death" attack)

In what you have above, "flooding" just means "sending more information than the server can handle."  For example, if I was to set up a program to send millions and millions of data packets to EE every second, I would overload (or flood) their servers.  Since their servers are flooded, you wouldn't be able to access EE.  I'm denying you the service of getting to EE, and that's why it's called a Denial of Service attack.

I hope this is what you need.  I will be out of town until Friday, so if this doesn't answer your question, feel free to email one of the PE's or delete this question and open a new one (or just wait for me to get back).
0
 

Author Comment

by:she1
ID: 13516788
1. what do you mean "PE's"?

2. thanks, i am concerning how to "to send millions and millions of data packets to EE every second"?

what email address should i send to creat the flooding of address?

thanks a lot
0
 
LVL 14

Expert Comment

by:JohnK813
ID: 13519627
1. Page Editors - See http://www.experts-exchange.com/help.jsp#hi141  For example, gemarti is one of the Page editors for Windows Security.

2. You don't want "to send millions and millions of data packets to EE every second" - it's illegal.  If you did, you'd be shutting Experts-Exchange down, and no one would have access to it.  (It's also not done by email, but that's besides the point.)
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
In this video, Percona Director of Solution Engineering Jon Tobin discusses the function and features of Percona Server for MongoDB. How Percona can help Percona can help you determine if Percona Server for MongoDB is the right solution for …
Suggested Courses
Course of the Month11 days, 11 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question