当前位置:网站首页>SSL flood attack of DDoS attack
SSL flood attack of DDoS attack
2022-07-03 01:29:00 【wecloud1314】
DDoS Common network attack means when attacking , And flooding SSL Links are DDoS One of the most common attack methods . For distributed denial of service attacks , When multiple systems exclude the broadband and resources of the target system , Multiple computers have overloaded access to the target server at the same time , Cause the server to crash .SSL Flood Flood attack is also such an attack mode .
In the deep SSL Flood Before the attack , You need to know something first . Transmission control protocol (TCP), It completes the functions specified by the fourth layer transport layer .TCP SYN Flood Flood attacks have existed for many years , also DDoS Detection and mitigation are largely passive , It can be seen that this attack will continue . If the server is being DDoS attack , The access interface will appear 504 Gateway timeout error .
If the supplier tests TCP Flood The ability to attack is getting higher and higher , Then it will turn to attack other levels , namely SSL / TLS layer . Just like the game of cat and mouse .
What is? SSL Flood?
SSL Flood Attack and SSL Renegotiation attacks all take advantage of server-side negotiation security TLS Processing capacity required for connection , Send a lot of garbage data to the server , Or constantly ask to renegotiate the connection , Thus, the resources of the server exceed the limit and take it offline .ssl The certificate application
Such as : common PushDo Botnet , Its adoption will SSL Server and garbage data overload , Try to SSL / TLS Attack it during handshake . because SSL / TLS Construction of protocol , When a large amount of data overflows and requests the server , The calculation cost may be high .
The other is for SSL The flood attack of handshake was originally considered SSL In the agreement “bug”——THC-SSL-DOS Tools .THC-SSL-DOS The goal of the tool is , Renegotiate the encryption method used for the connection . After successful connection , The tool will renegotiate with the server using the new encryption method , Will require server recalculation requirements .
among ,F5 Find a way to deal with these two attacks , Within a specified time , Ignore all required renegotiation connections . This can deceive the attacker into thinking that the attack has taken effect , In fact, these requests are ignored .
This article is only for those involved SSL Flood Two case studies of attacks , But in everyday life , Different types of vulnerabilities are found every day . Although at present, Internet devices and software can set up a variety of things to deal with DDoS attack , But at present, network security is in a relatively bad state , Even if equipped with advanced 、 Expensive equipment and software businesses , Still suffer every day DDoS attack .
therefore , Adequate protection preparation is needed , Make an action plan that can be completed quickly , To prevent DDoS attack , Instead of waiting for the attack to stop .
边栏推荐
- Detailed explanation of Q-learning examples of reinforcement learning
- MySQL - database query - basic query
- Why can't the start method be called repeatedly? But the run method can?
- 音程的知识的总结
- MySQL --- 数据库查询 - 条件查询
- 【系统分析师之路】第五章 复盘软件工程(开发模型开发方法)
- Button wizard play strange learning - automatic return to the city route judgment
- 按键精灵打怪学习-回城买药加血
- Kivy教程大全之如何在 Kivy 中创建下拉列表
- [system analyst's road] Chapter V double disk software engineering (development model development method)
猜你喜欢
[机缘参悟-36]:鬼谷子-飞箝篇 - 面对捧杀与诱饵的防范之道
Using tensorboard to visualize the model, data and training process
Arduino DY-SV17F自动语音播报
C application interface development foundation - form control (3) - file control
Androd Gradle 对其使用模块依赖的替换
给你一个可能存在 重复 元素值的数组 numbers ,它原来是一个升序排列的数组,并按上述情形进行了一次旋转。请返回旋转数组的最小元素。【剑指Offer】
软考信息系统项目管理师_历年真题_2019下半年错题集_上午综合知识题---软考高级之信息系统项目管理师053
Cut point of undirected graph
[interview question] 1369 when can't I use arrow function?
MySQL basic usage 02
随机推荐
MySQL foundation 05 DML language
【我的OpenGL学习进阶之旅】关于欧拉角、旋转顺序、旋转矩阵、四元数等知识的整理
dotConnect for PostgreSQL数据提供程序
一位苦逼程序员的找工作经历
Arduino dy-sv17f automatic voice broadcast
tp6快速安装使用MongoDB实现增删改查
【FPGA教程案例6】基于vivado核的双口RAM设计与实现
Vim 9.0正式发布!新版脚本执行速度最高提升100倍
强化学习 Q-learning 实例详解
MySQL - database query - condition query
Excel if formula determines whether the two columns are the same
Makefile中wildcard、patsubst、notdir的含义
【面试题】1369- 什么时候不能使用箭头函数?
C application interface development foundation - form control (4) - selection control
[androd] module dependency replacement of gradle's usage skills
海量数据冷热分离方案与实践
leetcode 2097 — 合法重新排列数对
Basic concept and implementation of overcoming hash
每日一题之干草堆的移动
基本远程连接工具Xshell