Distibuted Denial of Service or DDoS for
short is an attempt to make an online unavailable by overwhelming the traffic from
many sources in the same tine .They're favorite targets have a vareity of
important resources like banks , website news.
Ok,so how they do it?
The attackers build a huge network of
infected computere (botnets) and spreading the „evil” software trought emails or
social media . Some botnets are millions of machines strongBotnets ,they are very dangerouse because they când
take full control of the computer whitout the user to know what is happening right
under his nouse .
Buffer overflow attacks – the most common DoS attack. The concept
is to send more traffic to a network address than the programmers have built
the system to handle. It includes the attacks listed below, in addition to
others that are designed to exploit bugs specific to certain applications or networks
.
ICMP flood – leverages misconfigured network devices by sending
spoofed packets that ping every computer on the targeted network, instead of
just one specific machine.
SYN flood – sends a request to connect to a server, but never
completes the handshake.
TCP Connection Attacks - Occupying connections.
These
attempt to use up all the available connections to infrastructure devices such
as load-balancers, firewalls and application servers. Even devices capable of
maintaining state on millions of connections can be taken down by these
attacks.
Volumetric Attacks - Using up bandwidth.
These
attempt to consume the bandwidth either within the target network/service, or
between the target network/service and the rest of the Internet. These attacks
are simply about causing congestion.
Fragmentation Attacks - Pieces of packets.
These
send a flood of TCP or UDP fragments to a victim, overwhelming the victim's
ability to re-assemble the streams and severely reducing performance.
Application Attacks - Targeting applications.
These attempt to overwhelm a specific aspect of an application
or service and can be effective even with very few attacking machines
generating a low traffic rate (making them difficult to detect and mitigate).
DNS Reflection - Small request, big reply.
By forging a victim's IP address, an attacker can send small
requests to a DNS server and ask it to send the victim a large reply. This
allows the attacker to have every request from its botnet amplified as much as
70x in size, making it much easier to overwhelm the target.
Chargen Reflection - Steady streams of text.
Most computers and internet connected printers support an
outdated testing service called Chargen, which allows someone to ask a device
to reply with a stream of random characters. Chargen can be used as a means for
amplifying attacks similar to DNS attacks above.
In this
site , you can see DDos attack live , in this moment in world:
https://cybermap.kaspersky.com/
Comments
Post a Comment