Got it

Introduction to DDoS attacks

Latest reply: Dec 27, 2018 08:20:26 560 6 10 0 0

The DDoS attack method is a type of attack generated on the basis of the traditional DoS attack. A single DoS attack is generally one-to-one. When the target CPU speed is low, the memory is small, or the network bandwidth is small, the performance indicators are not high. With the development of computer and network technology, the processing power of computers has increased rapidly, the memory has increased greatly, and there are also gigabit, 10 Gigabit, and 100-level networks. This makes the difficulty of DoS attacks more difficult - the target is malicious. The "digestibility" of the attack package has been enhanced. For example, your attack software can send 3,000 attack packets per second, but my host and network bandwidth can handle 10,000 attack packets per second, so that the attack will not What effect will it produce.


At this time, distributed denial of service (DDoS) attacks came into being. Understanding the DoS attack, its principle is very simple. If the processing power of the computer and the network is increased by 10 times, and an attacker can no longer function with an attacker, will the attacker use 10 attackers to attack at the same time? Use 100 sets? DDoS is using more downtime to launch an attack, attacking the victim on a larger scale than before.


Distributed Denial of Service (DDoS) attacks refer to the use of client/server technology to combine multiple computers as an attack platform to launch DoS attacks on one or more targets, thereby multiplying denial of service attacks. power. Typically, an attacker uses a theft account to install the DDoS host program on a computer. At a set time, the master program communicates with a large number of agents that have been installed on many computers on the Internet. The agent launches an attack when it receives an instruction. With client/server technology, the master program can activate hundreds or thousands of agents in seconds.


The phenomenon when attacked by DDoS:


· There are a large number of waiting TCP connections on the attacked host.


· The network is flooded with a lot of useless packets, and the source address is false.


· Create high-traffic useless data, causing network congestion and preventing the victim host from communicating with the outside world.


· Using the service provided by the victim host or a defect in the transport protocol, repeatedly issue a specific service request at a high speed, so that the victim host cannot process all normal requests in time.


· In severe cases, the system will crash.



· There are a large number of waiting TCP connections on the attacked host.Can you provide a more detailed explanation?
View more
  • x
  • convention:

It is very helpful that Using the service provided by the victim host or a defect in the transport protocol, repeatedly issue a specific service request at a high speed, so that the victim host cannot process all normal requests in time.
View more
  • x
  • convention:

For the DDoS attack, you can deploy the Huawei USG firewall or the Anti DDoS to prevent the attack
View more
  • x
  • convention:

We have to deploy devices to depress this kind of attack.
View more
  • x
  • convention:

For example, your attack software can send 3,000 attack packets per second, but my host and network bandwidth can handle 10,000 attack packets per second, so that the attack will not What effect will it produce.??
View more
  • x
  • convention:

is small, the performance indicators are not high. With the development of computer and network technology, the processing power of computers has increased rapidly, the memory has increased greatly, and there are also gigabit, 10 Gigabit, and 100-level networks. This makes the difficulty of DoS attacks more difficult - the target is malicious. The "digestibility" of the attack package has been enhanced. For example, your attack software can send 3,000 attack packets per second, but my host and network bandwidth can handle 10,000 attack packets per second, so that the attack will not What effect will it produce.




At this time, distributed denial of service (DDoS) attacks came into being. Understanding the DoS attack, its principle is very simple. If the processing power of the computer and the network is increased by 10 times, and an attacker can no longer function with an attacker, will the attacker use 10 attackers to attack at the same time? Use 100 sets? DDoS is using more downtime to launch an attack, attacking the victim on a larger scale than before.




Distributed Denial of Service (DDoS) attacks refer to the use of client/server technology
!!!!!
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.