Monday, 17 November 2014
DoS & DDoS
Denial of Service Attack (Dos) or Distributed DOS (DDos) Attack
During Last few year the number of instant hackers get a vertical growth not in knowledge but in numbers, They just use the tools freely available on internet and start hacking after a few attempts and few successful tries try find them self in the list of world's best hackers.
Today after a long time I am here with a one of the most famous attack in the field of Computer Hacking and Security i.e. Dos or DDos.
What is a DoS Attack?
Denial of Service or DoS attack is a
type of network attack designed to flood the target network or machine
with a large amount of useless traffic so as to overload it and
eventually bring it down to its knees. The main intention behind DoS
attack is to make the services running on the target machine (such as a
website) temporarily unavailable to its intended users. DoS attacks are
usually carried out on web servers that host vital services such as
banking, e-commerce or credit card processing.
What is a DDoS Attack?
A common variant of DOS attack known as DDoS (Distributed Denial of Service)
attack has become quite popular in the recent days as it is more
powerful and hard to detect. A typical DoS attack has a single place of
origin while a DDoS attack originates from multiple IP addresses
distributed across two or more different network. The working of a DDoS
attack is shown in the following diagram:
Protection Against DoS/DDoS Attacks:
DoS attacks can easily be handled by
blacklisting the target IP (or range of IPs) that are found to be making
too many requests/connections (in an unnatural way) to the server.
However, DDoS attacks are complicated as the incoming requests seem more
natural and distributed. In this case it is hard to find the difference
between the genuine and malicious traffic. Taking an action at the
firewall level to blacklist suspected IPs may result in false positives
and therefore may affect the genuine traffic as well.
Methods Involved in DoS Attack:
The following are some of the commonly employed methods in carrying out a DoS attack:
- SYN Flood Attack
- Ping Flood Attack (Ping of Death)
- Teardrop Attack
- Peer-to-Peer Attacks
Tools For DoS or DDoS:
Subscribe to:
Posts (Atom)