Skip to main content

About DDoS Attack!

   Distibuted Denial of Service or DDoS for short is an attempt to make an online unavailable by overwhelming the traffic from many sources in the same tine .They're favorite targets have a vareity of important resources like banks , website news.

Ok,so how they do it?
  
   The attackers build a huge network of infected computere (botnets) and spreading the „evil” software trought emails or social media . Some botnets are millions of machines strongBotnets ,they are very dangerouse because they când take full control of the computer whitout the user to know what is happening right under his nouse .

Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic to a network address than the programmers have built the system to handle. It includes the attacks listed below, in addition to others that are designed to exploit bugs specific to certain applications or networks .

ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine. 

SYN flood – sends a request to connect to a server, but never completes the handshake.

TCP Connection Attacks - Occupying connections.

   These attempt to use up all the available connections to infrastructure devices such as load-balancers, firewalls and application servers. Even devices capable of maintaining state on millions of connections can be taken down by these attacks. 

Volumetric Attacks - Using up bandwidth.

   These attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion. 


Fragmentation Attacks - Pieces of packets.

   These send a flood of TCP or UDP fragments to a victim, overwhelming the victim's ability to re-assemble the streams and severely reducing performance. 


Application Attacks - Targeting applications.

   These attempt to overwhelm a specific aspect of an application or service and can be effective even with very few attacking machines generating a low traffic rate (making them difficult to detect and mitigate).
DNS Reflection - Small request, big reply.

   By forging a victim's IP address, an attacker can send small requests to a DNS server and ask it to send the victim a large reply. This allows the attacker to have every request from its botnet amplified as much as 70x in size, making it much easier to overwhelm the target. 
Chargen Reflection - Steady streams of text.

   Most computers and internet connected printers support an outdated testing service called Chargen, which allows someone to ask a device to reply with a stream of random characters. Chargen can be used as a means for amplifying attacks similar to DNS attacks above.
In this site , you can see DDos attack live , in this moment in world:
https://cybermap.kaspersky.com/

Comments

Popular posts from this blog

About type programs antivirus and protection on internet

      Antivirus Software , for what use , what is good and what they are eventually? Let’s start with a brief definition: antivirus software is generally used for prevention , protection and removal of computer viruses , also it has the function of scanning (detection) and removal of adware , spyware and malware. If you wonder what they are , well , they are the most common and known types of viruses. Computer Viruses exist for a long time , if i’m not wrong , even before the appearence of internet. They were spreat at first time by floppy disk and by through CD , they were hard to remove because there are few antivirus software and were updated relatively rare (infrequently).             Dr. Solomon’s Anti-Virus Toolkit , AIDSTEST si AntiVir were launched in 1988. At the end of the year 1990 were available 19 antivirus produces , including Norton AntiVirus and McAfee VirusScan .            Inf...

The games expected this year!

   Every year end announces countless surprises for gaming enthusiasts. They are lying in the mouth, waiting for the release dates of their most beloved video games. Whether we relate to those sequels of games well known by the gamer community or the emergence of new ones, one thing is certain: every important date is written down in the calendar. That being said, here are the 10 most anticipated games in 2017. #1 Marvel vs. Capcom: Infinete    Manufacturers have been discredited enough about this game, especially in connection with the exact launch date. In spite of rumors passing through the internet, the new game in the series will not contain X-Men characters, as game developers are no longer licensed to them. Marvel vs Capcom will include popular characters such as Iron Man, Captain America, Mega Man X or Ryu. If you've already lost your patience, you can enjoy a Marvel vs Capcom 3 that is now available on the PS4.    Marvel vs. Capcom: In...