DDOS Attack
DOS attack stands for Denial Of Service Attack.It means single attacker attacking single target. One computer and one Internet connection is used to flood the server with packets between valid and non valid request
The attacker sends the large number of legitimate looking to the server in a way that the server cannot really distinguish between valid and non valid request.
It will overwhelm the system to a point that the server cannot handle the capacity anymore.
The point of DOS attack is overload the targeted servers bandwidth and other computer resources.This will make the server inaccessible to others.
Instead of one computer and one Internet connection in normal DOS Attack. DDOS Attack utilize many computer and many connection the computer behind the such an attack are often contributed in the whole world and will be part of what is known as abundant.
So the first step of launching a DDOS Attack is recruit army of BOTS. Inorder to computer into a BOT the attacker develops a specialize malware which spreads many vulnerable computer as possible.
Malware can spread via compromised websites, e-mail attachments or through organization networks.Users who was tricked to running such malware will intensionally turn their computer into a BOT and provide access points to he attackers to their computers.
Once a computer turns into a BOT it connect to the attacker's command and control server and begins to accepts the orders from the centralized machines.
The orders from the commands and control server includes the direction of launching an attack from he BOT malware to particular target and the selecting attacking methods.
An army of path is named as BOTNET and usually consists of thousands of BOTS. Anytime the BOT's owner launch an attack.They send messages to their command and control server with the instruction to perform the attack on particular target.
Any infected machines in the BOTNET will comply by launching all coordinated will time distributed attack known as DDOS Attack.
DDOS : Target server will be overloaded by hundreds or even thousands of requests.
Therefore, its much harder for server
The attacker sends the large number of legitimate looking to the server in a way that the server cannot really distinguish between valid and non valid request.
It will overwhelm the system to a point that the server cannot handle the capacity anymore.
The point of DOS attack is overload the targeted servers bandwidth and other computer resources.This will make the server inaccessible to others.
What is DDOS Attack?
DDOS stands for Distributed Denial Of services Attack.It is most similar to DOS Attack, but the results are much difference.Instead of one computer and one Internet connection in normal DOS Attack. DDOS Attack utilize many computer and many connection the computer behind the such an attack are often contributed in the whole world and will be part of what is known as abundant.
So the first step of launching a DDOS Attack is recruit army of BOTS. Inorder to computer into a BOT the attacker develops a specialize malware which spreads many vulnerable computer as possible.
Malware can spread via compromised websites, e-mail attachments or through organization networks.Users who was tricked to running such malware will intensionally turn their computer into a BOT and provide access points to he attackers to their computers.
Once a computer turns into a BOT it connect to the attacker's command and control server and begins to accepts the orders from the centralized machines.
The orders from the commands and control server includes the direction of launching an attack from he BOT malware to particular target and the selecting attacking methods.
An army of path is named as BOTNET and usually consists of thousands of BOTS. Anytime the BOT's owner launch an attack.They send messages to their command and control server with the instruction to perform the attack on particular target.
Any infected machines in the BOTNET will comply by launching all coordinated will time distributed attack known as DDOS Attack.
Main difference between DOS and DDOS Attack
DOS : one attacker in DOS attack.DDOS : Target server will be overloaded by hundreds or even thousands of requests.
Therefore, its much harder for server
How to prevent DDOS Attack
It comes from many one is TORJAN .Attackers usually sends link with TROJAN and if the victim is open the link the attacker can be done whatever he wants with the computer.So that he simplest way to avoid he DDOS attack is don't open any unknown link.
Many professional company helps to mitigate the attack.The company install net flow protocol which is monitors traffic your sites. If you're serving your own data make sure all your routers drop junk packets blocks ICMP and strong firewall setup.
- Large companies leaves a significantly larger capacity than they need for DDOS attack. If the attacker unable to take over enough traffic of the the site the attack is generally ineffective.
- Automated Mitigation : Some company have a tool which monitors net flow data from routers to determine baseline for traffic.If detect any traffic that steps the out of the zone, DDOS mitigation tools can attract the traffic and filter it out.
- Third part provider : Many large companies often uses DNS base redirect service or BGP based service to protect them from attack.
Comments