当前位置:网站首页>SSL flood attack of DDoS attack
SSL flood attack of DDoS attack
2022-07-03 01:29:00 【wecloud1314】
DDoS Common network attack means when attacking , And flooding SSL Links are DDoS One of the most common attack methods . For distributed denial of service attacks , When multiple systems exclude the broadband and resources of the target system , Multiple computers have overloaded access to the target server at the same time , Cause the server to crash .SSL Flood Flood attack is also such an attack mode .
In the deep SSL Flood Before the attack , You need to know something first . Transmission control protocol (TCP), It completes the functions specified by the fourth layer transport layer .TCP SYN Flood Flood attacks have existed for many years , also DDoS Detection and mitigation are largely passive , It can be seen that this attack will continue . If the server is being DDoS attack , The access interface will appear 504 Gateway timeout error .
If the supplier tests TCP Flood The ability to attack is getting higher and higher , Then it will turn to attack other levels , namely SSL / TLS layer . Just like the game of cat and mouse .

What is? SSL Flood?
SSL Flood Attack and SSL Renegotiation attacks all take advantage of server-side negotiation security TLS Processing capacity required for connection , Send a lot of garbage data to the server , Or constantly ask to renegotiate the connection , Thus, the resources of the server exceed the limit and take it offline .ssl The certificate application
Such as : common PushDo Botnet , Its adoption will SSL Server and garbage data overload , Try to SSL / TLS Attack it during handshake . because SSL / TLS Construction of protocol , When a large amount of data overflows and requests the server , The calculation cost may be high .
The other is for SSL The flood attack of handshake was originally considered SSL In the agreement “bug”——THC-SSL-DOS Tools .THC-SSL-DOS The goal of the tool is , Renegotiate the encryption method used for the connection . After successful connection , The tool will renegotiate with the server using the new encryption method , Will require server recalculation requirements .
among ,F5 Find a way to deal with these two attacks , Within a specified time , Ignore all required renegotiation connections . This can deceive the attacker into thinking that the attack has taken effect , In fact, these requests are ignored .
This article is only for those involved SSL Flood Two case studies of attacks , But in everyday life , Different types of vulnerabilities are found every day . Although at present, Internet devices and software can set up a variety of things to deal with DDoS attack , But at present, network security is in a relatively bad state , Even if equipped with advanced 、 Expensive equipment and software businesses , Still suffer every day DDoS attack .
therefore , Adequate protection preparation is needed , Make an action plan that can be completed quickly , To prevent DDoS attack , Instead of waiting for the attack to stop .
边栏推荐
- 【我的OpenGL学习进阶之旅】关于欧拉角、旋转顺序、旋转矩阵、四元数等知识的整理
- Kivy tutorial how to create drop-down lists in Kivy
- Telephone network problems
- 按键精灵打怪学习-自动寻路回打怪点
- 按鍵精靈打怪學習-多線程後臺坐標識別
- CF1617B Madoka and the Elegant Gift、CF1654C Alice and the Cake、 CF1696C Fishingprince Plays With Arr
- Cut point of undirected graph
- [androd] module dependency replacement of gradle's usage skills
- Mathematical knowledge: Nim game game theory
- Excel removes the data after the decimal point and rounds the number
猜你喜欢

C application interface development foundation - form control (3) - file control

Expérience de recherche d'emploi d'un programmeur difficile

MySQL --- 数据库查询 - 条件查询

C#应用程序界面开发基础——窗体控制(2)——MDI窗体

【面试题】1369- 什么时候不能使用箭头函数?

Excel calculates the difference between time and date and converts it into minutes
![[机缘参悟-36]:鬼谷子-飞箝篇 - 面对捧杀与诱饵的防范之道](/img/c6/9aee30cb935b203c7c62b12c822085.jpg)
[机缘参悟-36]:鬼谷子-飞箝篇 - 面对捧杀与诱饵的防范之道
![[Arduino experiment 17 L298N motor drive module]](/img/e2/4511eaa942e4a64c8ca2ee70162785.jpg)
[Arduino experiment 17 L298N motor drive module]

Excel removes the data after the decimal point and rounds the number

Detailed explanation of Q-learning examples of reinforcement learning
随机推荐
Find a benchmark comrade in arms | a million level real-time data platform, which can be used for free for life
[principles of multithreading and high concurrency: 2. Solutions to cache consistency]
After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-9
攻克哈希的基本概念与实现
Do not log in or log in to solve the problem that the Oracle database account is locked.
C application interface development foundation - form control (2) - MDI form
【系统分析师之路】第五章 复盘软件工程(开发模型开发方法)
Tp6 fast installation uses mongodb to add, delete, modify and check
【无标题】
Leetcode 2097 - Legal rearrangement of pairs
[Androd] Gradle 使用技巧之模块依赖替换
Excel removes the data after the decimal point and rounds the number
uniapp组件-uni-notice-bar通告栏
How wide does the dual inline for bread board need?
Androd Gradle 对其使用模块依赖的替换
【QT】自定义控件的封装
Is there a handling charge for spot gold investment
Swiftui component Encyclopedia: using scenekit and swiftui to build interactive 3D pie charts (tutorial with source code)
[fh-gfsk] fh-gfsk signal analysis and blind demodulation research
【FH-GFSK】FH-GFSK信号分析与盲解调研究