Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
More information about DDoS Attack
#1
[Image: lfPOZiz.png]

Quote:What is a DDoS Attack?

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.

How does a DDoS attack work?

A DDoS attack requires an attacker to gain control of a network of online machines in order to carry out an attack. Computers and other machines (such as IoT devices) are infected with malware, turning each one into a bot (or zombie). The attacker then has remote control over the group of bots, which is called a botnet.

Once a botnet has been established, the attacker is able to direct the machines by sending updated instructions to each bot via a method of remote control. When the IP address of a victim is targeted by the botnet, each bot will respond by sending requests to the target, potentially causing the targeted server or network to overflow capacity, resulting in a denial-of-service to normal traffic. Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.

What are common types of DDoS attacks?

Different DDoS attack vectors target varying components of a network connection. In order to understand how different DDoS attacks work, it is necessary to know how a network connection is made. A network connection on the Internet is composed of many different components or “layers”. Like building a house from the ground up, each step in the model has a different purpose. The OSI model, shown below, is a conceptual framework used to describe network connectivity in 7 distinct layers.

Continue reading HERE
Reply


Messages In This Thread
More information about DDoS Attack - by tarekma7 - 05-12-2020 , 01:23 AM
RE: More information about DDoS Attack - by Mike - 05-12-2020 , 01:42 AM
RE: More information about DDoS Attack - by Mike - 05-12-2020 , 12:13 PM

Possibly Related Threads…
Thread Author Replies Views Last Post
  Ransomware gangs add DDoS attacks to their extortion arsenal tarekma7 0 1,470 10-02-2020 , 12:54 PM
Last Post: tarekma7
  How to Protect Xbox Console from DDoS Attacks tarekma7 0 1,364 08-06-2020 , 07:02 PM
Last Post: tarekma7
  What's the best DDoS Protected Server? tarekma7 0 1,731 06-29-2020 , 09:49 PM
Last Post: tarekma7

Forum Jump:


Users browsing this thread: 1 Guest(s)