当前位置:网站首页>Several misunderstandings about DDoS
Several misunderstandings about DDoS
2022-07-29 06:35:00 【Zhongyun era - defense testable - Xiaoyu】
brief introduction : Yes DDoS attack , Most people's cognition comes from news reports . The new article reports that this method is becoming popular DDoS Harmful colleagues , It will also unconsciously introduce some misunderstandings . for example , Attacks against internationally renowned enterprises have attracted more media attention , This leads many people to think that small and medium-sized websites will not suffer DDoS.
Yes DDoS attack , Most people's cognition comes from news reports . The new article reports that this method is becoming popular DDoS Harmful colleagues , It will also unconsciously introduce some misunderstandings . for example , Attacks against internationally renowned enterprises have attracted more media attention , This leads many people to think that small and medium-sized websites will not suffer DDoS. Besides , The number of attack traffic is often prominently displayed in reports , Remind readers of the seriousness of this attack , However, in fact, the size of the flow is not equal to the degree of harm . The following is a list about DDoS Common mistakes .
myth 1:DDOS Attacks are attacks that consume network bandwidth resources
A lot of times , We mentioned DDOS When the attack , It's all about “ How much attack traffic G even to the extent that T” To describe the intensity of the attack . This takes the bandwidth of attack traffic as DDOS Description Index of attack hazard degree , It usually makes people think DDOS Attacks are attacks that consume network bandwidth resources . in fact , In addition to network bandwidth resources ,DDOS There are also attack methods that consume system resources and application resources , And the size of attack traffic is only one aspect that determines the degree of attack harm . For similar attacks , Usually, the larger the attack traffic , The more harmful it is , If the attack traffic is the same , The harm and influence caused by different attack methods are also different . A lot of times , Everyone thought SYN Flood attacks consume network bandwidth resources DDOS One of the attacks , It's not , The main harm of this flood attack is to exhaust the resources of the system connection table .
myth 2:DDOS The attacks are all flood attacks
Generally, just mention DDOS attack , What people usually think of is UDP.SYN.RST Flood attack . So we think that DDOS An attack is a flood attack . in fact , The flood attack is just DDOS One of the attacks . In addition to the flood attack , Others are called slow attacks . Flood attacks are by sending large amounts of data and requests quickly , So as to quickly consume a lot of resources ; Slow attack is to send requests slowly and firmly and occupy target resources gradually for a long time .
myth 3: Cloud cleaning services and local mitigation devices can replace each other
DDOS It is a general term for various attack methods , Different attacks need different mitigation methods . General cloud cleaning services are mainly aimed at traffic DDOS attack , Adopt the method of dilution and shunt ; The local mitigation equipment can handle less traffic , It is suitable for fighting resource consumption and applying resource consumption DDOS attack . Everyone should choose the right solution according to their own business characteristics and major threats .
边栏推荐
- Vivado IP核之RAM Block Memery Generator
- Clickhouse failed to import CSV without error but no data
- FPGA - odd even frequency division and decimal frequency division code routine
- THINKPHP5 常见问题
- What is the lifecycle of automated testing?
- Official tutorial redshift 09 camera
- 基于TCP的在线词典
- 2022年的软件测试的岗位要求为何越来越高?这其中有什么不可告人的秘密吗?
- 使用STP生成树协议解决网络中的二层环路问题
- Vivado IP核之定点数转为浮点数Floating-point
猜你喜欢

Vivado IP核之定点数转为浮点数Floating-point

五、 无线通信网
![Summary of winter vacation training (1.23~1.28) [first tier]](/img/cf/2f86ecc23bfe6d96ad0429c785663a.png)
Summary of winter vacation training (1.23~1.28) [first tier]

三、广域通信网

FIR滤波器设计(2)——Vivado调用IP核设计FIR滤波器

Ue5 landscape conversion Nanite conversion method and it does not support the use method of starting dynamic mesh with lumen and lumen

day17_ Under collection

Personal views on time complexity

Navicat for Oracle Cannot create oci environment

基于FPGA的IIR型滤波器设计
随机推荐
高级套接口编程(选项和控制信息)
FIR滤波器设计(1)——利用matlab的fdatool工具箱设计FIR滤波器参数
7110 digital trend 2 solution
Arrays & object & System & Math & random & Packaging
day16-集合上
五、 无线通信网
day15_ generic paradigm
基于udp通信的在线多人聊天室
IGMP协议软件开发实验
Day16 set
Merkle Tree 存在性功能第一次修改
虹科分享 | FPGA 实现的直通与存储转发切换延迟
Vivado IP核之浮点数加减法 Floating-point
day09_ Static & Final & code block & abstract class & Interface & internal class
什么是撞库及撞库攻击的基本原理
Plugin location in mavan
Circular linked list and bidirectional linked list
超低成本DDoS攻击来袭,看WAF如何绝地防护
Ue5 texture system explanation and common problem setting and Solutions
Unity初学4——帧动画以及主角攻击(2d)