Results 1 to 6 of 6

Thread: Infrastructure Denial of Service

  1. #1
    Join Date
    Nov 2009
    Posts
    1,977

    Infrastructure Denial of Service

    Hi,
    The Denial-of-service or denial of service attack is a very advanced to mute a machine in the submerging of unnecessary traffic. There may be several machines behind the attack (an attack is then distributed Saver DDoS) which aims to wipe out servers, subnets, etc.. On the other hand, it remains very difficult to counter or avoid. What is the basic working of this attack and why the same is used.

  2. #2
    Join Date
    May 2008
    Posts
    2,945

    Re: Infrastructure Denial of Service

    Any event that prevents users authorized to perform the appropriate functions can be considered a Denial of Service. The denial of service may involve any component of the infrastructure, and strike even outside the department. The injection of UDP streams (against the internet company) and the jamming of radio-frequency intentional (directed against the WLAN enterprise) are types of denial of service.

  3. #3
    Join Date
    Feb 2008
    Posts
    2,635

    Re: Infrastructure Denial of Service

    In the context of this paper, a Denial of Service attack is making the WLAN fail (rather than an attack on the upper layers). The denial of service of wireless LANs (WLANs) are very easy to start. In fact, the mere fact of warming dish in the microwave can stop the WLAN function. The increased range of 802.11n (compared with the 802.11g / a) can also cause unwanted interference from neighboring WLANs. Deploying 802.11n in the frequency band 5 GHz can help reduce the risk of accidental interference DoS, the number of commercial products operating in this band is much lower than in other frequency bands.

  4. #4
    Join Date
    May 2008
    Posts
    3,516

    Re: Infrastructure Denial of Service

    Intruders can launch denial of service from the outside using a directional antenna pointing to radio frequency energy on the target WLAN. Unlike storms broadcast frames (broadcast storms) on the cable networks, which spread throughout the network, denial of service on wireless networks are limited to the area that is directly addressed. Several vulnerabilities of WLANs to denial of service (see below) are threatening the physical layer (PHY), the association process and the authentication process:
    • 802.11 networks are vulnerable to the deliberate transmission of RF signals that interrupt the transmission of packets and make the network unavailable.
    • 802.11 networks are vulnerable to denial of service that involve sending large numbers of frames to an access point (AP) via false MAC addresses.
    • 802.11 networks are vulnerable to denial of service flooding an access point with messages EAPoL Start.

  5. #5
    Join Date
    Apr 2008
    Posts
    3,424

    Re: Infrastructure Denial of Service

    Although there are many opportunities to launch denial of service, most companies see this risk as minimal and ignore it altogether. We recommend that you include a DoS scenario in your wireless plan for continuity of business operations. For some companies, it may even be wise to deploy a device-level monitoring network to detect denial of service, based on the use of RF detectors distributed throughout the enterprise.

  6. #6
    Join Date
    Apr 2008
    Posts
    3,339

    Re: Infrastructure Denial of Service

    Systems networking and wireless infrastructure are also vulnerable to attacks. The management systems are susceptible to network threats such as controlling unauthorized access points, controllers, switches and gateways. To protect the same change the default SSID name by a specific company. Using a WLAN-based controllers rather than autonomous access points. A WLAN system of this type provides a focal point of management and reduces the number of points of attack on the network. Improving access to WLAN equipment using strong passwords. Regularly change passwords. Disable access administrator side wireless access points and controllers of the wireless network. Check regularly for updates of software vendors and implement without delay the fixes that enhance network security.

Similar Threads

  1. Replies: 3
    Last Post: 10-11-2011, 10:39 PM
  2. Information about SAN infrastructure
    By Narsingh Dihu in forum Networking & Security
    Replies: 6
    Last Post: 17-02-2011, 04:56 PM
  3. Denial of Service attacks and other in Java
    By Talleen in forum Software Development
    Replies: 5
    Last Post: 29-07-2010, 05:41 AM
  4. Run VMware Infrastructure Client on Mac
    By Isiah in forum Windows Software
    Replies: 4
    Last Post: 21-05-2010, 03:42 PM
  5. Don't know what is DOS(Denial of service attack)
    By rooki in forum Networking & Security
    Replies: 3
    Last Post: 10-12-2009, 02:57 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,749,891,564.26032 seconds with 16 queries