当前位置:网站首页>Denial of service DDoS Attacks
Denial of service DDoS Attacks
2022-07-28 13:43:00 【allway2】
Imagine a scene , You are visiting some websites , One of the websites seems a little slow . You may blame their servers for improving their scalability , Because they may encounter a lot of user traffic on their website . Most websites have already considered this problem in advance . Is likely to , They may be called DDoS attack ( Distributed denial of service attacks ) The victims of . Reference resources - Denial of service and prevention
stay DDoS In attack , An attacker attempts to make a specific service unavailable by directing continuous and huge traffic from multiple terminal systems . Because of this huge traffic , Network resources are used to serve the requests of those fake terminal systems , Make legal users unable to access themselves / Her own resources .
DDoS The type of attack –
DDoS Attacks can be divided into three categories :
- Application layer attack ——
These attacks focus on attacks OSI The first of the model 7 layer , In this layer, web pages are generated in response to requests initiated by end users . For clients , Generating requests does not take up any heavy load , And you can easily generate multiple requests to the server . On the other hand , Responding to requests will put a considerable load on the server , Because it has to build all the pages 、 Calculate any queries and load the results from the database upon request .
Example : HTTP Flood Attack and attack DNS Attacks on services . - Protocol attacks ——
They are also called state exhaustion attacks . These attacks mainly target the protocol stack 3 Tier and tier 4 Layer vulnerability . These types of attacks consume Services 、 Resources such as firewalls and load balancers .
Example : SYN Flood Attack and Ping of Death. - Capacity attack ——
The focus of capacity attacks is to consume network bandwidth and saturate it through amplification or botnets , To hinder its availability to users . They are easily generated by directing large amounts of traffic to the target server .
Example : NTP Zoom in 、DNS Zoom in 、UDP Flood Attack and TCP Flood attack .
common DDoS attack –
- SYN Flood attack -
SYN Flood Attacking the way children work with naughty children constantly ringing the doorbell ( request ) And escape in a similar way . The old man inside came out , Open the door , I didn't see anyone ( No response ). Final , After this happens frequently , The old man is exhausted , Even real people can't answer .SYN The attack is deceptive by sending IP Address of the SYN Use information TCP handshake . The victim server continues to respond , But no final confirmation was received .
- HTTP Flood attack ——
stay HTTP The flood is attacking , Generate multiple at the same time for the target server HTTP request . This will cause the server to run out of network resources , Thus, the request of the actual user cannot be satisfied .HTTP Flood The variant of the attack is ——HTTP GET Attack and HTTP POST attack .

- DNS Zoom in ——
Suppose you call Pizza Hut , Ask them to call you back , And tell them all the pizza combinations as well as the ingredients and desserts . You generate a large output with very small input . however , The problem is that the number you gave them is not yours . Again ,DNS Zoom in through from deception IP Address request DNS Server and build your request to work , In order to DNS The server responds to a large amount of data to the target victim .

DDoS relieve –
prevent DDoS Attack ratio DoS Harder to attack , Because traffic comes from multiple sources , And it is difficult to separate malicious hosts from non malicious hosts . Some mitigation techniques that can be used are :
- Black hole routing ——
In black hole routing , Network traffic is directed to “ Black holes ”. under these circumstances , Both malicious and non malicious traffic will be lost in the black hole . When the server suffers DDoS Attack and all traffic is diverted to maintain the network , This countermeasure is very useful .
- Rate limit
Rate limiting involves controlling the rate of traffic sent or received by the network interface . It can effectively reduce the speed of web crawlers and brute force login work . however , Simply limiting the rate is unlikely to prevent recombination DDoS attack .
- The blacklist / White list –
Blacklists are those mentioned in the block list IP Address 、URL、 Domain name and other mechanisms that allow traffic from all other sources . On the other hand , The white list refers to all the items mentioned in the allowed list IP Address 、URL、 Domain name etc. , And deny access to network resources from all other sources .
边栏推荐
- Paddleclas classification practice record
- 持续(集成-->交付-->部署)
- Can second uncle cure young people's spiritual internal friction?
- C语言:随机生成数+快速排序
- Li Kou sword finger offer 51. reverse order pairs in the array
- 要想组建敏捷团队,这些方法不可少
- 拒绝服务 DDoS 攻击
- C语言学生成绩管理系统详解[通俗易懂]
- Continuous (integration -- & gt; delivery -- & gt; deployment)
- 国产API管理工具Eolink太好用了,打造高效的研发利器
猜你喜欢

【ECMAScript6】Promise

沾上趣店,都得道歉?

蓝桥集训(附加面试题)第七天

How much do you know about JVM memory management

半波整流点亮LED

org.apache.ibatis.exceptions.TooManyResultsException的异常排查过程

Countdown 2 days! 2022 China Computing Conference: Mobile cloud invites you to meet with computing network for innovative development

持续(集成-->交付-->部署)

GO语言-栈的应用-表达式求值

使用 IPtables 进行 DDoS 保护
随机推荐
什么叫杂谈(e网杂谈)
MySQL practice -- master-slave replication
FFT海浪模拟
JWT 登录认证 + Token 自动续期方案,写得太好了!
【黑马早报】字节估值缩水,降至2700亿美元;“二舅”视频作者回应抄袭;任泽平称取消商品房预售制是大势所趋;美联储宣布再加息75个基点...
C language: random number + quick sort
半波整流点亮LED
使用 IPtables 进行 DDoS 保护
Leetcode-190. inverting binary bits
我秃了!唯一索引、普通索引我该选谁?
leetcode-190.颠倒二进制位
LyScript 获取上一条与下一条指令
要想组建敏捷团队,这些方法不可少
.NET的求复杂类型集合的差集、交集、并集
Leetcdoe-342. Power of 4
C语言:随机生成数+归并排序
火山石投资章苏阳:硬科技,下一个10年相对确定的答案
Can second uncle cure young people's spiritual internal friction?
Tidb 6.x in action was released, a summary of 6.x practices that condense the collective wisdom of the community!
拒绝服务 DDoS 攻击