![Goodbye 3 / 5.2 Denial of Service Tool Goodbye 3 / 5.2 Denial of Service Tool](http://keenpatriot.weebly.com/uploads/1/2/3/8/123810972/799365090.png)
His teaching role has involved lecturing across a range of subject areas including Computer and Network Security, Digital Forensics, and Software Development at both undergraduate and postgraduate level. Rich is a Lecturer in the School of Computing at Edinburgh Napier University. While it has been reported that the breaching of TFTP would be possible ( Schultz, 2013), this paper provides a complete methodology for the setup of the attack, and its verification. Effects of this attack on both amplifier and target were analysed based on the proposed metrics. Mitigation methods to this threat have also been considered and a variety of countermeasures are proposed. This could be a substantial issue globally, due to the fact this protocol is used in approximately 599,600 publicly open TFTP servers. This attack could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks. This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Protocol (TFTP). One of the techniques to which attackers are returning to is DDoS amplification attacks.Īmplification attacks use intermediate devices called amplifiers in order to amplify the attacker's traffic. There is an increasing effort by governments and companies to shut down the botnets (Dittrich, 2012), which has lead the attackers to look for alternative DDoS attack methods. The DDoS attacks are usually performed from the large botnets, which are networks of remotely controlled computers. During last year 11% of DDoS attacks were over 60 Gbps (Prolexic, 2013a). Distributed Denial of Service (DDoS) attacks are typically executed from many sources and can result in large traffic flows. Denial of Service (DoS) attacks are one of the most significant web threats and generally their aim is to waste the resources of the target machine (Mirkovic & Reiher, 2004). This appears to be a significant issue, since many major businesses seem to provide these services. Generally, web threats increased as much as 600% during last year ( WebSense, 2013). Web threats are becoming a major issue for both governments and companies.