DOS
Privilege escalation
Dictionary attack
A denial of service attack. (DoS) This type of attack includes a variety of methods for denying legitimate users access to a network. A Distributed Denial of Service attack (DDos) is more specific type of DoS attack which includes many, mostly infected, devices sending traffic towards a single source to overload the target and prevent normal access.
Once thought of as a perimeter defense security layer, firewalls are being brought into the infrastructure to protect different segments of the network such as finance, HR and engineering. Using firewalls as part of the internal network security solution will provide additional layers of access control to protect against the organization's sprawling definition of "authorized user," as well as provide attack containment. Adding firewalls to the infrastructure enables enterprises to protect specific resources, forcing users to authenticate themselves as they move from network to network, thereby reducing the risk of unauthorized access to sensitive information. In addition to user containment, internal firewalls add attack containment to the network to prevent damages from spreading in the event that an attack occurs. Examples of effective use of network segmentation include wireless LANs and customer extranets. Placing these users in their own segment, behind their own policy-based firewall, will allow enterprises to contain the users as well as any potential damages that may occur if an attack were to succeed. Rather than buying a separate, physical firewall for every segment, Juniper Networks provides the ability to segment the network through the high physical and virtual port densities of our products. Once thought of as a perimeter defense security layer, firewalls are being brought into the infrastructure to protect different segments of the network such as finance, HR and engineering. Using firewalls as part of the internal network security solution will provide additional layers of access control to protect against the organization's sprawling definition of "authorized user," as well as provide attack containment. Adding firewalls to the infrastructure enables enterprises to protect specific resources, forcing users to authenticate themselves as they move from network to network, thereby reducing the risk of unauthorized access to sensitive information. In addition to user containment, internal firewalls add attack containment to the network to prevent damages from spreading in the event that an attack occurs. Examples of effective use of network segmentation include wireless LANs and customer extranets. Placing these users in their own segment, behind their own policy-based firewall, will allow enterprises to contain the users as well as any potential damages that may occur if an attack were to succeed. Rather than buying a separate, physical firewall for every segment, Juniper Networks provides the ability to segment the network through the high physical and virtual port densities of our products.
SYN flooding
A Packet Replication Attack is an Internal attack on the Networking layer of the OSI model, in which the attacker belongs to the same network the victims belong to and attacks the resources inside the network. This makes it harder to find out who the attacker is. When a Packet Replication Attack is performed the attacker replicates stale packets (packets that are delayed past a certain time) and sends them to a trigger network. This results in loss of bandwidth of the network, and this will eventually start consuming battery life of the nodes as well.
attack the network at the root
A denial of service attack is a technique that hackers use once they have already gained access to an individual computer, or a larger network. They essentially keep the computer or network so busy that it cannot access the internet. One would not use this technique to stop hackers. Strong virus and malware protection, coupled with a firewall, is the best defense.
A DoS attack can mimic non-malicious availability concerns like network congestion or a system administrator performing maintenance. The following signs may suggest a DoS or DDoS attack: Irregular network performance with reduced speed Inability to access any website Certain websites turn out to be unavailable Monitoring and analysing network traffic is the most prominent way to identify and evaluate a DoS attack.
if user configures the routers and all other network resources with ISO standards specifications.(we can stop only to certain extent).
Looks like DDoS.
Most likely it's DDoS. There is nothing you can do about it.