|
Most Common Methods Used For DDoS Attacks
|
Posted On :
Dec-23-2010
| seen (577) times |
Article Word Count :
423
|
|
In the world of cyber security a denial of service attack (DoS) is basic category of attack that attempts to make a server or network unavailable to its intended users. The concept is fairly simple and easy to understand.
|
In the world of cyber security a denial of service attack (DoS) is basic category of attack that attempts to make a server or network unavailable to its intended users. The concept is fairly simple and easy to understand. A network router or server can handle a finite amount of traffic at any given point in time and that depends on a number of factors including memory, available bandwidth, and hardware performance. If the traffic limit is surpassed, then any new requests will be denied.
The motives, means, and targets of DoS attacks vary greatly, but the goal of any such attack is not to gain unauthorized access to information, but rather to cause disruption and inconvenience. When targeted against targets such as a DNS server, the results can be quite serious.
DDoS Attacks:
A more advanced form of DoS attack, DDoS attacks (distributed denial of service attacks) are multi-tiered attacks that involve a number of machines working together to flood a target with traffic. In general, the process involves an attacker breaking into a number of internet connected computers and installing the DDoS software which can turn thousands of machines into "slaves" to the "master" device. Working together, several hundred machines can easily generate gigabytes of traffic to overwhelm a target until it crashes or becomes useless. The targets of these attacks can be routers, servers, or even specific computers.
Types of DDoS Attacks:
Malware and Trojans are two of the most common methods used for DDoS attacks. MyDoom is probably the most famous example of a DDoS attack. The software installed on the "slave" machines is designed to use one or more of several different types of DoS attack. Ping flood, SYN flood, and smurf attacks are the most common, sending a lot of ICMP echo traffic to a particular IP address.
Dealing with DDos Attacks:
There are ways to mitigate the damage done by DDoS attacks. The first step is to investigate the attack and determine the target of the attack and then inform your Telecom Company or ISP of the attack so they can disperse the traffic.
Preventing DDoS attacks is not easy and requires a community effort and stricter security standards. There are a number of cyber security companies that perceive these types of attacks as increasing in frequency and severity and see the need for increased security standards. Currently the best defense is anticipating the attack before it happens and having some sort of response plan prepared.
|
|
Article Source :
http://www.articleseen.com/Article_Most Common Methods Used For DDoS Attacks_45730.aspx
|
Author Resource :
Sumit Gurg provides information about Ddos Protection ,Ddos Attacks and DNS Management Tools.for more details visit at: http://www.nominum.com
|
Keywords :
Ddos Protection, Ddos Attacks, DNS Management Tools,
Category :
Internet Business
:
Internet Business
|
|
|
|