当前位置:网站首页>The performance and viewing methods of websites attacked by DDoS
The performance and viewing methods of websites attacked by DDoS
2022-07-29 06:35:00 【Zhongyun era - defense testable - Xiaoyu】
With the simplification of network attack , Now DDoS attack It has not only appeared in large websites , Even a lot of small and medium-sized websites and even personal websites may be faced with being DDoS The risk of attack . Maybe a lot of webmasters are right DDoS Attacks don't know much about , When a website is attacked in time, it can't be found in time , Causes the website to appear frequently big cannot open the situation ,, In order to let stationmaster people avoid network to receive DDoS The impact on the attack . Let's introduce the website in detail DDoS The performance of the attack and how to view it .
The website was DDoS The performance of the
1. The server CPU Be heavily occupied
DDoS The attack is actually a malicious resource occupation attack , The attacker sends a large number of invalid requests to the target server by using broiler or attack software , Causes the server's resources to be occupied by a large number of , So the normal process is not handled effectively , In this way, the website will open slowly . If the server can pop up for a certain period of time CPU High occupancy , Then it may be that the website has been CC The impact of the attack .
2. Bandwidth is heavily used
Taking up bandwidth resources is usually DDoS One of the main means of attack , After all, for many small businesses or personal websites , Bandwidth resources can be said to be very limited , When the bandwidth of the network is occupied by a large number of invalid data , Normal traffic data requests are very difficult to be processed by the server . If the uplink bandwidth utilization rate of the server reaches 90% When above , Then your website usually appears to be DDoS The possibility of attack .
3 The server is not connected to , The website can't be opened
If the web server is massive DDoS When the attack , It may cause server blue screen or crash , This means that the server is no longer connected , There is a connection error on the website . Of course, when this kind of request occurs, we'd better confirm whether the server is caused by hardware failure and so on , Otherwise, we should do a good job in the defense of the first segment when connecting to the server .
4. domain name ping Don't out IP
Perhaps the stationmaster of this kind of circumstance may compare little consider , This is also true DDoS A manifestation of attack , Just attack the target of the attack is the website DNS Domain name server . In the event of such an attack ,ping Server's IP It's connected normally , But the website just can't be opened normally , And in ping The domain name will appear abnormal ping General information .
In fact, in life ,DNS It is very common for domain name servers to be attacked , For example, when we have network access , Found that all websites can not be opened normally , however QQ The network application can still run normally .
because DDoS There are many types of attacks , It's hard to judge the type of network attack simply by the performance of the website , So we can start from the server side , Use common commands to make judgments :
The first type :CC Class attack
command :netstat –na,
If a large number of ESTABLISHED Connection state of Single IP Up to dozens or even hundreds
The second type :SYN Class attack
command ::netstat –an,
If a large number of SYN_RECEIVED Connection state of
The third type :UDP Class attack
Observe the status of the network card Accept a large number of packets per second
Network state :netstat –nan TCP The message is OK
The fourth type :TCP Flood attack
command :netstat –an,
If a large number of ESTABLISHED Connection state of Single IP Up to dozens or even hundreds
The above is the website by DDoS The performance of the attack and the related introduction of the viewing method , For website operation ,DDoS It's a huge impact , Even if there are regular DDoS When the attack , May also be destructive to the site , Therefore, the stationmaster should guard against DDoS Need more attention , Once the site appears to receive DDoS The performance of the attack , Take the necessary defensive measures immediately .
边栏推荐
- 虹科白皮书 | 在工业4.0阶段,如何利用TSN时间敏感网络技术打造数字化工厂?
- TCP socket communication experiment
- 虹科分享 | 为什么说EtherCAT是提高控制系统性能的最佳解决方案?
- 2022 summer second day information competition learning achievement sharing 1
- day13_ Under multithreading
- 摊余成本最牛例子
- Is it OK to directly compare the size of two numbers in FPGA?
- Idea practical shortcut key novice must see
- day04_数组
- 钓鱼邮件处置
猜你喜欢

五、 无线通信网

三、广域通信网

Software testing career development: where should software testers go

虹科 | 使用JESD204串行接口高速桥接模拟和数字世界

子网数、主机数与子网掩码的关系

day12_ Multithreading

What are the advantages of software testing? See how much you know

Vivado IP核之RAM Block Memery Generator

Access、Hybrid和Trunk三种模式的理解

EtherCAT主站掉线后,如何保证目标系统免受故障影响?
随机推荐
FPGA里两个数的大小直接进行比较就可以吗?
JVM memory structure
不安全的第三方组件的漏洞如何做前置规避?
运算符重载
Scanbasepackages scanning range configuration
UDP套接口通信实验
Arrays&Object&System&Math&Random&包装类
Access、Hybrid和Trunk三种模式的理解
钓鱼邮件处置
子网数、主机数与子网掩码的关系
FIR滤波器设计(1)——利用matlab的fdatool工具箱设计FIR滤波器参数
服务器135、137、138、139、445等端口解释和关闭方法
2022 summer second day information competition learning achievement sharing 2
什么是撞库及撞库攻击的基本原理
day10_ Exception handling & enumeration
Solve the error that the simulation output is STX under the frequency division module Modelsim
day14_单元测试&日期常用类&字符串常用类
网站受DDoS攻击的表现以及查看方法
通过os-shell引发的mysql拿shell的思考
网络安全学习(一)