Category: IT|Feb 18, 2017 | Author: Admin

What Is a DDoS attack?

Share on

Today, every information we shares on the internet, are being saved somewhere in the server. It is very important to keep servers alive to access those information. Some information can be shared to anyone but some of them are very important for us and we can’t let anyone know. Hackers always try to get private information to do their dirty work.

Today, every information we shares on the internet, are being saved somewhere in the server. It is very important to keep servers alive to access those information. Some information can be shared to anyone but some of them are very important for us and we can’t let anyone know. Hackers always try to get private information to do their dirty work.

But, Hacking is not just about stealing the information. When hackers do not get success in stealing , they try to destroy the whole server. In this case, we may lose all the information on the server if we don’t have any backup or a proper defence.

What Is a DDoS attack?
Now a days, we hear a lot about attacks on gaming networks, news websites, bank websites etc. And when i write about those attacks i mention one term that is ‘DDoS’. Many readers may have already know about ‘DDoS’ attacks but many of them are still not aware and they always ask me : What is DDoS ?

So in this article, i  am going to explain everything you need to know about DDoS attacks. If you will have any question, you can ask in comment section.

Distributed denial of service (DDos) attack refers to the attempt to make online service unavailable through overwhelming it with traffic from numerous sources. DDoS attack targets a wide range of important resources including news websites, banks, and many more. They pose a challenge to people’s attempts to access or publish important information.A decade ago, DDOS was only a basic attack that trying to overwhelm connection with traffic with the aim of taking a certain web property offline. When leading web experts began fighting DDoS attack in the year 2000, the flood attacks ranged at 400 Mbps but as we speak they exceed 100 Gbps.

The attackers build a network of infected computers called botnet and spread the malicious software through websites, emails and social media. The machines are capable of being controlled remotely once infected without the knowledge of owners. These machines are then used like the army in launching an attack against the target. Some botnet are as strong as millions of machines. The floods are generated in numerous ways including sending more connection requests that exceeds what a server can handle. They can also be generated by having the computers send to the victim huge volume of random data with the intention of using up the target’s bandwidth. Some DDOS attacks are so huge that they can max out the whole country’s international cable capacity.

 
Specialized online marketers exist who buy and sell individual DDoS attacks or botnet. By using these marketplaces, anyone can pay some fee in order to silence websites that they disagree with or to bring to complete halt online operations of a particular organization. A week-long DDoS attack for instance that is capable of bringing a small firm offline could cost as little as $200.

Beyond the democratization of DDoS attacks are the advanced techniques and targets. Today DDoS involves a series of attacks targeting multiple devices that consist of the organization’s security infrastructure as opposed to targeting connection bandwidth only. They include various applications and firewall or IPS devices that organizations rely on such as DNS, SMTP, VOIP, HTTPS and HTTP. The latest version of DDOS attack is the common multi-vector attack that combines flood, state exhaustion and application attacks against the infrastructure devices in a sustained single attack. These attacks have gained popularity due to their effectiveness and the fact that they are hard to defend against.

Bonus : Watch Live Worldwide DDoS Attacks

Today’s new realities of DDOS attack require new approaches to defense. Network experts have been in the forefront in looking for ways to combat DDOS attack for some years now. The best defensive mechanism against the modern DDOS attack is the layered approach combining cloud based protection and on-premise. With this type of protection, you are guaranteed of 100% security for your organization against the entire spectrum of DDOS attacks. A digital attack map is also ideal for protection against a DDOS attack because it displays global DDOS activities on any particular day. It displays the attacks as dotted lines that are scaled to size and stored in line with their source and the destination countries of attack traffic when they are known.

Sponsored Ads:

Comments:


Siri can no longer tell the clock

Category: Apple|May 4, 2024 | Author: Admin

Struggling with VPN

Category: Microsoft|May 3, 2024 | Author: Admin

This is how Huawei tricked its way into the US

Category: IT|May 2, 2024 | Author: Admin

Edge 125 arrives in Beta with sleeping tab improvements and other changes

Category: IT|May 1, 2024 | Author: Admin

Now the iPad opens

Category: Apple|Apr 30, 2024 | Author: Admin

Woke up locked out of Apple ID on iPhone

Category: Apple|Apr 29, 2024 | Author: Admin

Google has a hidden collection of highly-addictive retro games

Category: Google|Apr 28, 2024 | Author: Admin

Google is officially a $2 trillion company

Category: Google|Apr 27, 2024 | Author: Admin

Snowden: “DO NOT use Reddit!”

Category: IT|Apr 26, 2024 | Author: Admin

Popular Google app used by millions set to close in a few weeks

Category: Google|Apr 25, 2024 | Author: Admin

Cheeky, YouTube!

Category: Google|Apr 24, 2024 | Author: Admin

This is the date Apple will reveal new iPads

Category: Apple|Apr 23, 2024 | Author: Admin

Only possible with VPN

Category: IT|Apr 22, 2024 | Author: Admin

Apple sidles into sideloading in the EU

Category: Apple|Apr 21, 2024 | Author: Admin

Report: Microsoft-OpenAI ownership might get conditional OK from EU regulators

Category: IT|Apr 20, 2024 | Author: Admin
more