当前位置:网站首页>Denial of service DDoS Attacks
Denial of service DDoS Attacks
2022-07-28 13:43:00 【allway2】
Imagine a scene , You are visiting some websites , One of the websites seems a little slow . You may blame their servers for improving their scalability , Because they may encounter a lot of user traffic on their website . Most websites have already considered this problem in advance . Is likely to , They may be called DDoS attack ( Distributed denial of service attacks ) The victims of . Reference resources - Denial of service and prevention
stay DDoS In attack , An attacker attempts to make a specific service unavailable by directing continuous and huge traffic from multiple terminal systems . Because of this huge traffic , Network resources are used to serve the requests of those fake terminal systems , Make legal users unable to access themselves / Her own resources .
DDoS The type of attack –
DDoS Attacks can be divided into three categories :
- Application layer attack ——
These attacks focus on attacks OSI The first of the model 7 layer , In this layer, web pages are generated in response to requests initiated by end users . For clients , Generating requests does not take up any heavy load , And you can easily generate multiple requests to the server . On the other hand , Responding to requests will put a considerable load on the server , Because it has to build all the pages 、 Calculate any queries and load the results from the database upon request .
Example : HTTP Flood Attack and attack DNS Attacks on services . - Protocol attacks ——
They are also called state exhaustion attacks . These attacks mainly target the protocol stack 3 Tier and tier 4 Layer vulnerability . These types of attacks consume Services 、 Resources such as firewalls and load balancers .
Example : SYN Flood Attack and Ping of Death. - Capacity attack ——
The focus of capacity attacks is to consume network bandwidth and saturate it through amplification or botnets , To hinder its availability to users . They are easily generated by directing large amounts of traffic to the target server .
Example : NTP Zoom in 、DNS Zoom in 、UDP Flood Attack and TCP Flood attack .
common DDoS attack –
- SYN Flood attack -
SYN Flood Attacking the way children work with naughty children constantly ringing the doorbell ( request ) And escape in a similar way . The old man inside came out , Open the door , I didn't see anyone ( No response ). Final , After this happens frequently , The old man is exhausted , Even real people can't answer .SYN The attack is deceptive by sending IP Address of the SYN Use information TCP handshake . The victim server continues to respond , But no final confirmation was received .
- HTTP Flood attack ——
stay HTTP The flood is attacking , Generate multiple at the same time for the target server HTTP request . This will cause the server to run out of network resources , Thus, the request of the actual user cannot be satisfied .HTTP Flood The variant of the attack is ——HTTP GET Attack and HTTP POST attack .

- DNS Zoom in ——
Suppose you call Pizza Hut , Ask them to call you back , And tell them all the pizza combinations as well as the ingredients and desserts . You generate a large output with very small input . however , The problem is that the number you gave them is not yours . Again ,DNS Zoom in through from deception IP Address request DNS Server and build your request to work , In order to DNS The server responds to a large amount of data to the target victim .

DDoS relieve –
prevent DDoS Attack ratio DoS Harder to attack , Because traffic comes from multiple sources , And it is difficult to separate malicious hosts from non malicious hosts . Some mitigation techniques that can be used are :
- Black hole routing ——
In black hole routing , Network traffic is directed to “ Black holes ”. under these circumstances , Both malicious and non malicious traffic will be lost in the black hole . When the server suffers DDoS Attack and all traffic is diverted to maintain the network , This countermeasure is very useful .
- Rate limit
Rate limiting involves controlling the rate of traffic sent or received by the network interface . It can effectively reduce the speed of web crawlers and brute force login work . however , Simply limiting the rate is unlikely to prevent recombination DDoS attack .
- The blacklist / White list –
Blacklists are those mentioned in the block list IP Address 、URL、 Domain name and other mechanisms that allow traffic from all other sources . On the other hand , The white list refers to all the items mentioned in the allowed list IP Address 、URL、 Domain name etc. , And deny access to network resources from all other sources .
边栏推荐
- jar包
- 111. SAP UI5 FileUploader 控件实现本地文件上传,接收服务器端的响应时遇到跨域访问错误
- 比XShell更好用、更现代的终端工具!
- 火山石投资章苏阳:硬科技,下一个10年相对确定的答案
- [ecmascript6] function and its related use
- C language: random generated number + merge sort
- 【黑马早报】字节估值缩水,降至2700亿美元;“二舅”视频作者回应抄袭;任泽平称取消商品房预售制是大势所趋;美联储宣布再加息75个基点...
- 合并表格行---三层for循环遍历数据
- Beyond Istio OSS——Istio服务网格的现状与未来
- 从手机厂高位“出走”的三个男人
猜你喜欢

Volcanic stone investment Zhang Suyang: hard technology, the relatively certain answer in the next 10 years

.NET桌面开发的一些思考

Humiliation, resistance, reversal, 30 years, China should win Microsoft once

Three men "running away" from high positions in the mobile phone factory

FFT海浪模拟

蓝桥集训(附加面试题)第七天

酷炫操作预热!代码实现小星球特效

严格模式——let和const——箭头函数——解构赋值——字符串模板symbol——Set和Map——生成器函数

用非递归的方法实现二叉树中的层遍历,先序遍历,中序遍历和后序遍历

Leetcode-136. numbers that appear only once
随机推荐
Gamestop bear market entered NFT trading, and established game retailers took advantage of Web3 to make a second spring
数据库系统原理与应用教程(058)—— MySQL 练习题(二):单选题
Aragon creates Dao polygon BSC test network
无法连接服务器怎么办(原始服务器找不到目标资源)
Have a part of the game, after NFT is disabled in my world
少儿编程 电子学会图形化编程等级考试Scratch二级真题解析(判断题)2022年6月
沾上趣店,都得道歉?
今日睡眠质量记录75分
Today's sleep quality record 75 points
Some thoughts on.Net desktop development
剖析 kubernetes 集群内部 DNS 解析原理
ES6 null merge operator (?)
Auto.js enables Taobao to quickly submit orders
数据库系统原理与应用教程(060)—— MySQL 练习题:操作题 11-20(四)
Map tiles: detailed explanation of vector tiles and grid tiles
C语言:优化后的归并排序
Leetcode-136. numbers that appear only once
不用Swagger,那我用啥?
Half wave rectification light LED
docker部署mysql 实现远程连接[通俗易懂]