当前位置:网站首页>SSL flood attack of DDoS attack
SSL flood attack of DDoS attack
2022-07-03 01:29:00 【wecloud1314】
DDoS Common network attack means when attacking , And flooding SSL Links are DDoS One of the most common attack methods . For distributed denial of service attacks , When multiple systems exclude the broadband and resources of the target system , Multiple computers have overloaded access to the target server at the same time , Cause the server to crash .SSL Flood Flood attack is also such an attack mode .
In the deep SSL Flood Before the attack , You need to know something first . Transmission control protocol (TCP), It completes the functions specified by the fourth layer transport layer .TCP SYN Flood Flood attacks have existed for many years , also DDoS Detection and mitigation are largely passive , It can be seen that this attack will continue . If the server is being DDoS attack , The access interface will appear 504 Gateway timeout error .
If the supplier tests TCP Flood The ability to attack is getting higher and higher , Then it will turn to attack other levels , namely SSL / TLS layer . Just like the game of cat and mouse .

What is? SSL Flood?
SSL Flood Attack and SSL Renegotiation attacks all take advantage of server-side negotiation security TLS Processing capacity required for connection , Send a lot of garbage data to the server , Or constantly ask to renegotiate the connection , Thus, the resources of the server exceed the limit and take it offline .ssl The certificate application
Such as : common PushDo Botnet , Its adoption will SSL Server and garbage data overload , Try to SSL / TLS Attack it during handshake . because SSL / TLS Construction of protocol , When a large amount of data overflows and requests the server , The calculation cost may be high .
The other is for SSL The flood attack of handshake was originally considered SSL In the agreement “bug”——THC-SSL-DOS Tools .THC-SSL-DOS The goal of the tool is , Renegotiate the encryption method used for the connection . After successful connection , The tool will renegotiate with the server using the new encryption method , Will require server recalculation requirements .
among ,F5 Find a way to deal with these two attacks , Within a specified time , Ignore all required renegotiation connections . This can deceive the attacker into thinking that the attack has taken effect , In fact, these requests are ignored .
This article is only for those involved SSL Flood Two case studies of attacks , But in everyday life , Different types of vulnerabilities are found every day . Although at present, Internet devices and software can set up a variety of things to deal with DDoS attack , But at present, network security is in a relatively bad state , Even if equipped with advanced 、 Expensive equipment and software businesses , Still suffer every day DDoS attack .
therefore , Adequate protection preparation is needed , Make an action plan that can be completed quickly , To prevent DDoS attack , Instead of waiting for the attack to stop .
边栏推荐
- 攻克哈希的基本概念与实现
- Using tensorboard to visualize the model, data and training process
- [flutter] icons component (fluttericon Download Icon | customize SVG icon to generate TTF font file | use the downloaded TTF icon file)
- 【无标题】
- SwiftUI 组件大全之使用 SceneKit 和 SwiftUI 构建交互式 3D 饼图(教程含源码)
- Arduino dy-sv17f automatic voice broadcast
- 2022 cable crane driver examination registration and cable crane driver certificate examination
- MySQL基础用法02
- Kivy tutorial how to create drop-down lists in Kivy
- [principles of multithreading and high concurrency: 2. Solutions to cache consistency]
猜你喜欢

Why can't the start method be called repeatedly? But the run method can?

【FPGA教程案例6】基于vivado核的双口RAM设计与实现

MySQL

Basic remote connection tool xshell

力扣 204. 计数质数

Wireshark data analysis and forensics a.pacapng

Matlab Doppler effect produces vibration signal and processing

Excel removes the data after the decimal point and rounds the number
![[机缘参悟-36]:鬼谷子-飞箝篇 - 面对捧杀与诱饵的防范之道](/img/c6/9aee30cb935b203c7c62b12c822085.jpg)
[机缘参悟-36]:鬼谷子-飞箝篇 - 面对捧杀与诱饵的防范之道

【无标题】
随机推荐
Kivy tutorial how to create drop-down lists in Kivy
数学知识:Nim游戏—博弈论
Meibeer company is called "Manhattan Project", and its product name is related to the atomic bomb, which has caused dissatisfaction among Japanese netizens
On Fibonacci sequence
Leetcode 2097 - Legal rearrangement of pairs
[技术发展-23]:DSP在未来融合网络中的应用
按键精灵打怪学习-回城买药加血
一位苦逼程序员的找工作经历
【无标题】
Matlab Doppler effect produces vibration signal and processing
[shutter] animation animation (the core class of shutter animation | animation | curvedanimation | animationcontroller | tween)
按键精灵打怪学习-自动回城路线的判断
Key wizard hit strange learning - automatic path finding back to hit strange points
Matlab finds the position of a row or column in the matrix
MySQL foundation 05 DML language
MySQL --- 数据库查询 - 基本查询
Vim 9.0正式发布!新版脚本执行速度最高提升100倍
[FPGA tutorial case 6] design and implementation of dual port RAM based on vivado core
MySQL --- 数据库查询 - 条件查询
wirehark数据分析与取证A.pacapng