Abstract: | Denial-of-service (DoS) attacks have been around for a long time. In the computer network arena, DoS attacks usually take one of two forms: 1) exploiting bugs in network clients or server applications, in an attempt to crash the application (and possibly the host on which it is running) or 2) flooding a network server with fake traffic, making it difficult or impossible for the server to receive and process legitimate traffic. The former are typically carried out by using ‘buffer overrun attacks’ in which a network application is sent a large amount of data which it fails to handle properly, instead overwriting critical information with the excess data. |