Tugas Essay DDoS and IoT
Tugas Essay DDoS and IoT
Tugas Essay DDoS and IoT
DDoS attacks cause loss of so many things. With the overload incidents,
downtime and new problems occur. Moreover, the additional costs that arise to
repair the hosting, as well as traffic and bandwidth costs. When this happens to a
company, the customers of the company will be disappointed and this will
increase the customer churn. The other disadvantage is the loss of log files or
drop data caused by servers and network devices that have to reboot.
To overcome the problems above and reduce the impact of a DDoS attack,
there are some prevention needed. Things that can be done is preparing a plan
that will be executed when attack is happen, periodically check the network and
detect abnormal patterns, perform basic traffic filtering, blocking suspicious IP,
and verify the server and network. Another thing that might be done by an
computers expert is to create new applications that can handle DDoS attacks or
minimizing the impact of this attack.
References
Wueest, Candid. (2014). The Continued Rise of DDoS attacks. Symantec, October
21, 2014.
Rozenfeld, Monica. (2014). The Value of Privacy. The Insitute. March, 2014.
Greenberg, Adam. (2014). Amplification DDoS Attacks Most Popular, According To
Symantec. SC Magazine. <http://www.scmagazine.com/distributed-denial-ofservice-attacks-are-increasing-in-power/article/379299/>
Administrator. (2013). What is a DDoS Attack? Digital Attack Map.
< http://www.digitalattackmap.com/understanding-ddos/>
Anonymous. 2014. Asal Mula Berdirinya KASKUS dan Istilah-istilah yang
digunakan.
<http://www.kaskus.co.id/post/53517e6240cb17871f8b48aa#post53517e6240
cb17871f8b48aa>
Southurst, Jon. (2013). Bitcoin Payment Processor BIPS Attacked, Over $1 Million
Stolen. < http://www.coindesk.com/bitcoin-payment-processor-bips-attacked1m-stolen/>
Maynard, James. (2013). Cloud Storage the First 50 Years.
<http://www.mosaicarchive.com/2013/01/03/cloud-storage-the-first-50-years/>