当前位置:网站首页>DDoS attack principle, the phenomenon of being attacked by DDoS
DDoS attack principle, the phenomenon of being attacked by DDoS
2022-07-05 11:10:00 【IDC02_ FEIYA】
DDOS Attack principle , By ddos The phenomenon of attack
Distributed denial of service (DDOS:Distributed Denial of Service) Attack means with the help of customers / Server technology , Combine multiple computers as an attack platform , Launch on one or more targets DoS attack , This will multiply the power of denial of service attacks . Usually , An attacker using a stolen account will DDoS The master program is installed on a computer , At a set time, the master program will communicate with a large number of agents , The agent has been installed in Internet On many computers on . When the agent receives instructions, it launches an attack . Using customers / Server technology , The master program can activate hundreds of agent runs in a few seconds .
· DDOS Attack principle
DoS There are many ways to attack , The most basic DoS An attack is to use reasonable service requests to occupy too much service resources , So that legitimate users can not get the response of the service .
DDoS The means of attack are traditional DoS A kind of attack mode based on attack . Single DoS Attacks are usually one-on-one , When attacking the target CPU Low speed 、 The performance indexes such as small memory or small network bandwidth are not high, and its effect is obvious . With the development of computer and network technology , The processing power of computers is growing rapidly , Memory is greatly increased , At the same time, there are Gigabit networks , This makes DoS The difficulty of the attack has increased - Target against malicious attack packets ” Digestion ” A lot more , For example, your attack software can send every second 3,000 An attack pack , But my host and network bandwidth can handle every second 10,000 An attack pack , In this way, the attack will have no effect .
At this time, distributed denial of service attacks (DDoS) And that's what happened . You understand. DoS Words of attack , Its principle is very simple . If we say that the processing capacity of computers and networks has increased 10 times , If attacking with an attacker no longer works , Use by attackers 10 Two attack planes attack at the same time ? use 100 What about Taiwan ?DDoS It's using more puppet machines to launch attacks , Attack the victim on a larger scale than ever before .
The high-speed and widely connected network brings convenience to everyone , Also for the DDoS The attack created extremely favorable conditions . In the era of low-speed networks , When hackers occupy the puppet machine for attack , Always give priority to machines close to the target network , Because the number of hops passing through the router is small , The effect is good . Now, the connection between backbone nodes of telecommunications is based on G For the level of , Between big cities can reach 2.5G The connection of , This allows attacks to be launched from further places or other cities , The location of the attacker's puppet machine can be distributed in a larger range , It's more flexible to choose .
· By DDoS The phenomenon of attack
1、 There is a lot of waiting on the attacked host TCP Connect
2、 The network is full of useless packets , Source address is false
3、 Making high traffic useless data , Causing network congestion , Make the victim host unable to communicate with the outside world
4、 Take advantage of the defects in the service or transport protocol provided by the victim host , Repeatedly send specific service requests at high speed , So that the victim host cannot process all normal requests in time
5、 If it is serious, it will cause system crash
边栏推荐
- LSTM applied to MNIST dataset classification (compared with CNN)
- 上拉加载原理
- 2022 chemical automation control instrument examination questions and online simulation examination
- 一次edu证书站的挖掘
- Some understandings of heterogeneous graphs in DGL and the usage of heterogeneous graph convolution heterographconv
- 【Oracle】使用DataGrip连接Oracle数据库
- Data types ntext and varchar are incompatible in the not equal to operator - 95 small pang
- SSL证书错误怎么办?浏览器常见SSL证书报错解决办法
- Beego cross domain problem solution - successful trial
- Paradigm in database: first paradigm, second paradigm, third paradigm
猜你喜欢
Implement the rising edge in C #, and simulate the PLC environment to verify the difference between if statement using the rising edge and not using the rising edge
Crawler (9) - scrape framework (1) | scrape asynchronous web crawler framework
R3live series learning (IV) r2live source code reading (2)
如何将 DevSecOps 引入企业?
Go-3-第一个Go程序
关于vray 5.2的使用(自研笔记)
Stop saying that microservices can solve all problems!
Review the whole process of the 5th Polkadot Hackathon entrepreneurship competition, and uncover the secrets of the winning projects!
DDRx寻址原理
[Oracle] use DataGrid to connect to Oracle Database
随机推荐
NAS and San
Modulenotfounderror: no module named 'scratch' ultimate solution
华为设备配置信道切换业务不中断
2022 Pengcheng cup Web
使用bat命令一键启动常用浏览器
Repair animation 1K to 8K
Ddrx addressing principle
【全网首发】(大表小技巧)有时候 2 小时的 SQL 操作,可能只要 1 分钟
2022 t elevator repair operation certificate examination questions and answers
磨砺·聚变|知道创宇移动端官网焕新上线,开启数字安全之旅!
购买小间距LED显示屏的三个建议
[advertising system] parameter server distributed training
Array
Stop saying that microservices can solve all problems!
vite//
Node の MongoDB Driver
[JS learning notes 54] BFC mode
PWA (Progressive Web App)
Detailed explanation of MATLAB cov function
uboot的启动流程: