introduce The most basic DoS attack is that the attacker uses a large number of reasonable service requests to occupy too many service resources of the target, so that legitimate users cannot get service responses. DDOS attack is also called "distributed attack". It uses illegal data to flood network links. These data may flood Internet links and cause legitimate data flows to be discarded. DoS (Denial of Service) attacks are usually carried out in a one-to-one manner. When the performance indicators of the attack target are not high (such as low CPU speed, small memory or small network bandwidth, etc.), its effect is obvious. However, DDOS attacks are more terrible than DOS (Denial of Service) and are extremely large in scale. They usually target hundreds or even tens of thousands of computers in an attempt to flood the target machine, paralyzing it within 1 minute. Even if it is a giant machine, it is impossible to handle thousands or tens of thousands of target machines at once to receive so many data packets. Similarly, flood attacks are also a type of this type of attack. Features Classification A flood attack , also known as a Flood attack, is an attack in which an attacker sends a large number of disguised service request messages to the target through a botnet, proxy, or directly, eventually exhausting the target's resources. The large number of messages sent can be TCP SYN and ACK messages, UDP messages, ICMP messages, DNS messages, HTTP/HTTPS messages, etc. Malformed message attacks usually refer to attackers sending a large number of defective or special control messages, which cause the host or server to crash when processing such messages. Malformed message attacks include Smurf, Land, Fraggle, Teardrop, WinNuke attacks, etc. Special control message attacks include oversized ICMP messages, ICMP redirect messages, ICMP unreachable messages, and various IP message attacks with options. Scanning and probing attacks are potential attack behaviors that do not directly cause damage. They are usually network probing behaviors before attackers launch real attacks, such as IP address scanning and port scanning. Tiers DDoS attacks are classified according to the TCP/IP protocol layers: network layer attacks, transport layer attacks, and application layer attacks. Network layer: IP address scanning attack, most special control message attacks, Teardrop attack, Smurf attack, IP fragment message attack, ICMP Flood attack Transport layer: SYN Flood, SYN-ACK Flood, ACK Flood, FIN/RST Flood, TCP connection exhaustion attack, UDP Flood (including various reflection attacks), TCP/UDP fragment message attack, DNS Flood, DNS cache poisoning, and other attacks related to TCP, UDP messages and ports Application layer: HTTP Flood, HTTP slow attack, HTTPS Flood, SSL DDoS attack, SIP Flood Attack Methods DDoS attacks occupy a large amount of network resources through a large number of legitimate requests in order to paralyze the network. They can be divided into the following categories: 1. Interfere with or even block normal network communications by overloading the network. 2. Overload the server by submitting a large number of requests to the server. 3. Block a certain user from accessing the server. 4. Block the communication between a service and a specific system or individual.
How to defend? From the current perspective, although it is not easy to reduce the impact of DDoS attacks, necessary measures can still be taken to reduce losses. For enterprises, defending against DDoS attacks is just as important as deploying security solutions such as anti-virus protection, targeted attack defense, and data leakage measures. 【Editor's recommendation】
[Editor: Jiang Hua TEL: (010) 68476606] |
<<: What exactly is UWB technology?
>>: How to make the key cut in 5G network slicing?
Friendhosting has launched a SysAdmin Day Sale pr...
We have all been amazed at the power and speed of...
Where does the “mutual trust” of the sharing econ...
2020 is a big year for 5G capital expenditure. Be...
TmhHost launched a number of special-priced indep...
Nowadays, whether people like it or not, the Inte...
Market development and technological progress com...
The API gateway can be seen as the entrance for t...
[[356187]] About two years ago, when 5G had just ...
CYUN is a cloud computing service brand under Hon...
How about DMIT.io? This is a foreign hosting comp...
LOCVPS (Global Cloud) launched its first promotio...
Today, in the telecommunications sector, 5G and I...
iWebFusion (or iWFHosting) is a subsidiary of the...
Communication technology, as a basic technology, ...