No service?

Denial of Service attacks can also lead to problems in the network ‘branches’ around the actual computer being attacked. For example, the bandwidth of a router between the internet and a LAN may be consumed by DoS, meaning not only will the intended computer be compromised, but the entire network will also be disrupted.

IP spoofing is the most fundamental of all security threats in computer networks, as it helps the perpetrators of network attacks to hide their identity as well as the execution point(s) of the attack. Most DDoS attacks are carried out using ‘spoofed’ source IP addresses, to make it difficult to identify the sources of the attack. This is to make the attack difficult to defuse, as spoofed IP headers make it difficult for the origin(s) of the attack to be identified and blocked off.


Reflector attack packets may contain genuine source addresses, but it is those servers’ inability to verify the source of ‘spoofed’ requests that cause the attack. If for example a server being used as a reflector can find out that the requests it receives are ‘spoofed,’ it can easily take steps not to respond to those requests, and thereby avoid being part of the attack. Collectively, that would make it impossible for attackers to use reflectors to carry out a DoS attack.

One of the most fundamental problems faced when responding to DoS attacks is to differentiate between legitimate service requests and attack traffic; to service legitimate requests and drop attack packets. A failure to distinguish between the two could lead to legitimate requests not being served, leading the ‘denial of (legitimate) services,’ either as a result of the attack or as a consequence of a response to the attack.

Identifying a DoS attack is also a challenge, as it could be difficult to distinguish between a DoS attack and a sudden increase in legitimate traffic. This task is further complicated by IP spoofing, which makes it very difficult to differentiate between attack traffic and legitimate traffic. The difference between heavy network traffic and a DoS attack can be ambiguous at the best of times.

Detection of a DoS attack is complicated given the above two reasons. A DoS attack may not be detected until services or service quality actually breaks down. Furthermore, the exact point at which legitimate service requests are not met as a result of an ‘attack’ on the system or network is difficult to predict or determine. An increase in legitimate traffic may cause DoS. However, there is no way of avoiding the degradation of quality of service under such circumstances other than by increasing bandwidth.

Top  Back to Top   Back To Mirror Back to Mirror

Copyright © 2006 Wijeya Newspapers Ltd. All rights reserved.