1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
10

What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more

dangerous and devastating? why?
Computers and Technology
1 answer:
KIM [24]3 years ago
6 0
A denial-of-service (or DoS) attack is where one single computer continuously sends information to a particular IP address in an attempt to overload the network, and take it down. It is called denial-of-service, because you are literally preventing other legitimate users from accessing the server. DoS attacks are not as commonly done professionally today, due to modern technological advances where these servers are able to cope with lots of junk packets from one user, and will often times just block their IP address if the packets are sent too frequently.

A distributed denial-of-service attack is where an IP address is overloaded from multiple users at the same time, often general users like you and I. The way this is accomplished is through botnets, which are simple non-malicious programs that are retrieved through downloading things on the internet, often things like torrents, and they are hard to remove due to them being non malicious. A botnet simply routes internet traffic from the user's computer to the victim's IP address, and due to the nature of a botnet being able to spread to multiple computers very quickly via the internet, DDoS'ing is a much more potentially devastating attack, and loads of junk packets coming from tons of different users compared to one user in a DoS attack is much more likely to take down a server or a network. Additionally, the victim server is unable to distinguish the difference between an attacker and a legitimate user, as the packets are not sent too frequently from each user as to not get IP blocked, but the attack rather relies on the fact that there could sometimes be hundreds of thousands of users all at once, attacking a single IP address.
You might be interested in
Which type of communication protocol converts data into standard formats that can be used by applications?
larisa86 [58]
<span>Arrival protocols are the type of data protocols that convert data into standard formats that can be used by applications, such as email, Web browsers and Skype</span>
8 0
3 years ago
Program for bit stuffing...?
Olegator [25]

Answer: Program for bit stuffing in C

#include<stdio.h>

      int main()

    {    

          int i=0,count=0;

          char data[50];

          printf("Enter the Bits: ");

          scanf("%s",data);            //entering the bits ie. 0,1  

          printf("Data Bits Before Bit Stuffing:%s",databits);

          printf("\nData Bits After Bit stuffing :");

          for(i=0; i<strlen(data); i++)

              {

              if(data[i]=='1')

                     count++;

              else

                     count=0;

                printf("%c",data[i]);

             if(count==4)

                {

                          printf("0");

                          count=0;

                 }

             }

    return 0;

 }

Explanation:

bit stuffing is the insertion of non-information bits during transmission of frames between sender and receiver. In the above program we are stuffing 0 bit after 4 consecutive 1's. So to count the number of 1's we have used a count variable. We have used a char array to store the data bits . We use a for loop to iterate through the data bits to stuff a 0 after 4 consecutive 1's.

4 0
3 years ago
What happens to the Menu Bar when the<br> object (image, shape, etc.) is "active"?
nexus9112 [7]

Answer: Ok so Sorry about this but I will answer thing at 10:20 tommorow I promise

Explanation:

5 0
2 years ago
The term unauthorized access is a synonym for hacking. <br><br> a. True <br><br> b. False
natita [175]
The answer is True. Hacking is synonymous with unauthorized access most especially when it is intentional. Unauthorized access is defined as illegally gaining access to a file on a computer. It is the same as accessing a network or system without the permission of the owner.
8 0
3 years ago
Which network device regenerates the data signal without segmenting the network? modem?
Yanka [14]
Hub(s) is the answer
6 0
3 years ago
Other questions:
  • What is the equivalent of film speed in digital cameras?
    6·2 answers
  • The major difference between a calculator and a computer, when performing calculations, is that a
    10·1 answer
  • Throwing an improperly drained oil filter into the trash dumpster is a violation that can carry heavy penalties. A) true b) fals
    7·1 answer
  • Pros and cons of access to a wide range of online services when it comes to an individual's safety?
    14·1 answer
  • Which slide elements must claire use to enhance her presentation?
    10·2 answers
  • Why is local hosting not suitable for a public website?
    15·1 answer
  • 1. A bank customer invested $24 in a bank with 5 percent simple interest per year, write a program the construct a table showing
    11·1 answer
  • What's your opinion on Pokemon​ and pixeldip
    5·1 answer
  • Busco a talcotalco38
    14·2 answers
  • In large organizations, database design and management is handled by a database _____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!