当前位置:网站首页>DDoS attack principle, the phenomenon of being attacked by DDoS
DDoS attack principle, the phenomenon of being attacked by DDoS
2022-07-05 11:10:00 【IDC02_ FEIYA】
DDOS Attack principle , By ddos The phenomenon of attack
Distributed denial of service (DDOS:Distributed Denial of Service) Attack means with the help of customers / Server technology , Combine multiple computers as an attack platform , Launch on one or more targets DoS attack , This will multiply the power of denial of service attacks . Usually , An attacker using a stolen account will DDoS The master program is installed on a computer , At a set time, the master program will communicate with a large number of agents , The agent has been installed in Internet On many computers on . When the agent receives instructions, it launches an attack . Using customers / Server technology , The master program can activate hundreds of agent runs in a few seconds .
· DDOS Attack principle
DoS There are many ways to attack , The most basic DoS An attack is to use reasonable service requests to occupy too much service resources , So that legitimate users can not get the response of the service .
DDoS The means of attack are traditional DoS A kind of attack mode based on attack . Single DoS Attacks are usually one-on-one , When attacking the target CPU Low speed 、 The performance indexes such as small memory or small network bandwidth are not high, and its effect is obvious . With the development of computer and network technology , The processing power of computers is growing rapidly , Memory is greatly increased , At the same time, there are Gigabit networks , This makes DoS The difficulty of the attack has increased - Target against malicious attack packets ” Digestion ” A lot more , For example, your attack software can send every second 3,000 An attack pack , But my host and network bandwidth can handle every second 10,000 An attack pack , In this way, the attack will have no effect .
At this time, distributed denial of service attacks (DDoS) And that's what happened . You understand. DoS Words of attack , Its principle is very simple . If we say that the processing capacity of computers and networks has increased 10 times , If attacking with an attacker no longer works , Use by attackers 10 Two attack planes attack at the same time ? use 100 What about Taiwan ?DDoS It's using more puppet machines to launch attacks , Attack the victim on a larger scale than ever before .
The high-speed and widely connected network brings convenience to everyone , Also for the DDoS The attack created extremely favorable conditions . In the era of low-speed networks , When hackers occupy the puppet machine for attack , Always give priority to machines close to the target network , Because the number of hops passing through the router is small , The effect is good . Now, the connection between backbone nodes of telecommunications is based on G For the level of , Between big cities can reach 2.5G The connection of , This allows attacks to be launched from further places or other cities , The location of the attacker's puppet machine can be distributed in a larger range , It's more flexible to choose .
· By DDoS The phenomenon of attack
1、 There is a lot of waiting on the attacked host TCP Connect
2、 The network is full of useless packets , Source address is false
3、 Making high traffic useless data , Causing network congestion , Make the victim host unable to communicate with the outside world
4、 Take advantage of the defects in the service or transport protocol provided by the victim host , Repeatedly send specific service requests at high speed , So that the victim host cannot process all normal requests in time
5、 If it is serious, it will cause system crash
边栏推荐
- 谈谈对Flink框架中容错机制及状态的一致性的理解
- Based on shengteng AI Aibi intelligence, we launched a digital solution for bank outlets to achieve full digital coverage of information from headquarters to outlets
- Four departments: from now on to the end of October, carry out the "100 day action" on gas safety
- 磨礪·聚變|知道創宇移動端官網煥新上線,開啟數字安全之旅!
- LDAP overview
- Go project practice - Gorm format time field
- 2021 Shandong provincial competition question bank topic capture
- Codeforces Round #804 (Div. 2)
- iframe
- Three suggestions for purchasing small spacing LED display
猜你喜欢
Stop saying that microservices can solve all problems!
Detailed explanation of MATLAB cov function
[Oracle] use DataGrid to connect to Oracle Database
About the use of Vray 5.2 (self research notes)
小红书自研KV存储架构如何实现万亿量级存储与跨云多活
Huawei equipment configures channel switching services without interruption
Implement the rising edge in C #, and simulate the PLC environment to verify the difference between if statement using the rising edge and not using the rising edge
R3live series learning (IV) r2live source code reading (2)
关于vray 5.2的使用(自研笔记)
【广告系统】Parameter Server分布式训练
随机推荐
Wechat nucleic acid detection appointment applet system graduation design completion (7) Interim inspection report
[JS learning notes 54] BFC mode
Basic part - basic project analysis
Node の MongoDB Driver
About the use of Vray 5.2 (self research notes) (II)
Wechat nucleic acid detection appointment applet system graduation design completion (6) opening defense ppt
跨页面通讯
Data types ntext and varchar are incompatible in the not equal to operator - 95 small pang
Web3 Foundation grant program empowers developers to review four successful projects
Use bat command to launch common browsers with one click
A usage example that can be compatible with various database transactions
【广告系统】增量训练 & 特征准入/特征淘汰
数据库三大范式
About the use of Vray 5.2 (self research notes)
中职组网络安全C模块全漏洞脚本讲解包含4个漏洞的脚本
Go语言-1-开发环境配置
中职组网络安全2021年江苏省省赛题目5套题目环境+解析全有需要的私信我
Pull up loading principle
msfconsole命令大全,以及使用说明
Stop saying that microservices can solve all problems!