当前位置:网站首页>DDoS attack principle, the phenomenon of being attacked by DDoS
DDoS attack principle, the phenomenon of being attacked by DDoS
2022-07-05 11:10:00 【IDC02_ FEIYA】
DDOS Attack principle , By ddos The phenomenon of attack
Distributed denial of service (DDOS:Distributed Denial of Service) Attack means with the help of customers / Server technology , Combine multiple computers as an attack platform , Launch on one or more targets DoS attack , This will multiply the power of denial of service attacks . Usually , An attacker using a stolen account will DDoS The master program is installed on a computer , At a set time, the master program will communicate with a large number of agents , The agent has been installed in Internet On many computers on . When the agent receives instructions, it launches an attack . Using customers / Server technology , The master program can activate hundreds of agent runs in a few seconds .
· DDOS Attack principle
DoS There are many ways to attack , The most basic DoS An attack is to use reasonable service requests to occupy too much service resources , So that legitimate users can not get the response of the service .
DDoS The means of attack are traditional DoS A kind of attack mode based on attack . Single DoS Attacks are usually one-on-one , When attacking the target CPU Low speed 、 The performance indexes such as small memory or small network bandwidth are not high, and its effect is obvious . With the development of computer and network technology , The processing power of computers is growing rapidly , Memory is greatly increased , At the same time, there are Gigabit networks , This makes DoS The difficulty of the attack has increased - Target against malicious attack packets ” Digestion ” A lot more , For example, your attack software can send every second 3,000 An attack pack , But my host and network bandwidth can handle every second 10,000 An attack pack , In this way, the attack will have no effect .
At this time, distributed denial of service attacks (DDoS) And that's what happened . You understand. DoS Words of attack , Its principle is very simple . If we say that the processing capacity of computers and networks has increased 10 times , If attacking with an attacker no longer works , Use by attackers 10 Two attack planes attack at the same time ? use 100 What about Taiwan ?DDoS It's using more puppet machines to launch attacks , Attack the victim on a larger scale than ever before .
The high-speed and widely connected network brings convenience to everyone , Also for the DDoS The attack created extremely favorable conditions . In the era of low-speed networks , When hackers occupy the puppet machine for attack , Always give priority to machines close to the target network , Because the number of hops passing through the router is small , The effect is good . Now, the connection between backbone nodes of telecommunications is based on G For the level of , Between big cities can reach 2.5G The connection of , This allows attacks to be launched from further places or other cities , The location of the attacker's puppet machine can be distributed in a larger range , It's more flexible to choose .
· By DDoS The phenomenon of attack
1、 There is a lot of waiting on the attacked host TCP Connect
2、 The network is full of useless packets , Source address is false
3、 Making high traffic useless data , Causing network congestion , Make the victim host unable to communicate with the outside world
4、 Take advantage of the defects in the service or transport protocol provided by the victim host , Repeatedly send specific service requests at high speed , So that the victim host cannot process all normal requests in time
5、 If it is serious, it will cause system crash
边栏推荐
- 9、 Disk management
- SQL Server monitoring statistics blocking script information
- 购买小间距LED显示屏的三个建议
- Process control
- DOM//
- 磨砺·聚变|知道创宇移动端官网焕新上线,开启数字安全之旅!
- When using gbase 8C database, an error is reported: 80000502, cluster:%s is busy. What's going on?
- DDRx寻址原理
- Buried point 111
- Stop saying that microservices can solve all problems!
猜你喜欢

Crawler (9) - scrape framework (1) | scrape asynchronous web crawler framework

About the use of Vray 5.2 (self research notes)

Talk about the understanding of fault tolerance mechanism and state consistency in Flink framework

How to introduce devsecops into enterprises?

关于vray 5.2的使用(自研笔记)

Wechat nucleic acid detection appointment applet system graduation design completion (6) opening defense ppt

Intelligent metal detector based on openharmony

Question bank and answers of special operation certificate examination for main principals of hazardous chemical business units in 2022

Lombok 同时使⽤@Data和@Builder 的坑,你中招没?

32:第三章:开发通行证服务:15:浏览器存储介质,简介;(cookie,Session Storage,Local Storage)
随机推荐
Lombok 同时使⽤@Data和@Builder 的坑,你中招没?
Process control
上拉加载原理
When using gbase 8C database, an error is reported: 80000502, cluster:%s is busy. What's going on?
中职组网络安全C模块全漏洞脚本讲解包含4个漏洞的脚本
32: Chapter 3: development of pass service: 15: Browser storage media, introduction; (cookie,Session Storage,Local Storage)
About the use of Vray 5.2 (self research notes) (II)
一次edu证书站的挖掘
磨礪·聚變|知道創宇移動端官網煥新上線,開啟數字安全之旅!
A mining of edu certificate station
[TCP] TCP connection status JSON output on the server
Lazy loading scheme of pictures
Review the whole process of the 5th Polkadot Hackathon entrepreneurship competition, and uncover the secrets of the winning projects!
Deepfake tutorial
Ddrx addressing principle
力扣(LeetCode)185. 部门工资前三高的所有员工(2022.07.04)
Web3 Foundation grant program empowers developers to review four successful projects
How to make full-color LED display more energy-saving and environmental protection
2021 Shandong provincial competition question bank topic capture
Wechat nucleic acid detection appointment applet system graduation design completion (8) graduation design thesis template