当前位置:网站首页>Several misunderstandings about DDoS
Several misunderstandings about DDoS
2022-07-29 06:35:00 【Zhongyun era - defense testable - Xiaoyu】
brief introduction : Yes DDoS attack , Most people's cognition comes from news reports . The new article reports that this method is becoming popular DDoS Harmful colleagues , It will also unconsciously introduce some misunderstandings . for example , Attacks against internationally renowned enterprises have attracted more media attention , This leads many people to think that small and medium-sized websites will not suffer DDoS.
Yes DDoS attack , Most people's cognition comes from news reports . The new article reports that this method is becoming popular DDoS Harmful colleagues , It will also unconsciously introduce some misunderstandings . for example , Attacks against internationally renowned enterprises have attracted more media attention , This leads many people to think that small and medium-sized websites will not suffer DDoS. Besides , The number of attack traffic is often prominently displayed in reports , Remind readers of the seriousness of this attack , However, in fact, the size of the flow is not equal to the degree of harm . The following is a list about DDoS Common mistakes .
myth 1:DDOS Attacks are attacks that consume network bandwidth resources
A lot of times , We mentioned DDOS When the attack , It's all about “ How much attack traffic G even to the extent that T” To describe the intensity of the attack . This takes the bandwidth of attack traffic as DDOS Description Index of attack hazard degree , It usually makes people think DDOS Attacks are attacks that consume network bandwidth resources . in fact , In addition to network bandwidth resources ,DDOS There are also attack methods that consume system resources and application resources , And the size of attack traffic is only one aspect that determines the degree of attack harm . For similar attacks , Usually, the larger the attack traffic , The more harmful it is , If the attack traffic is the same , The harm and influence caused by different attack methods are also different . A lot of times , Everyone thought SYN Flood attacks consume network bandwidth resources DDOS One of the attacks , It's not , The main harm of this flood attack is to exhaust the resources of the system connection table .
myth 2:DDOS The attacks are all flood attacks
Generally, just mention DDOS attack , What people usually think of is UDP.SYN.RST Flood attack . So we think that DDOS An attack is a flood attack . in fact , The flood attack is just DDOS One of the attacks . In addition to the flood attack , Others are called slow attacks . Flood attacks are by sending large amounts of data and requests quickly , So as to quickly consume a lot of resources ; Slow attack is to send requests slowly and firmly and occupy target resources gradually for a long time .
myth 3: Cloud cleaning services and local mitigation devices can replace each other
DDOS It is a general term for various attack methods , Different attacks need different mitigation methods . General cloud cleaning services are mainly aimed at traffic DDOS attack , Adopt the method of dilution and shunt ; The local mitigation equipment can handle less traffic , It is suitable for fighting resource consumption and applying resource consumption DDOS attack . Everyone should choose the right solution according to their own business characteristics and major threats .
边栏推荐
猜你喜欢

Vivado IP核之RAM Block Memery Generator
![[leetcode brush questions] array 3 - divide and conquer](/img/76/bc3d9ba0b84578e17bf30195bda5d1.png)
[leetcode brush questions] array 3 - divide and conquer

服务器135、137、138、139、445等端口解释和关闭方法

虹科Automation softPLC | 虹科KPA MoDK运行环境与搭建步骤(3)——MoDK例程测试

day14_单元测试&日期常用类&字符串常用类

五、 无线通信网

虹科分享 | 带你全面认识“CAN总线错误”(二)——CAN错误类型

Thinking about MySQL taking shell through OS shell

自动化测试的生命周期是什么?

Vivado IP核之复数浮点数乘法 Floating-point
随机推荐
Unity初学4——帧动画以及主角攻击(2d)
2022 summer second day information competition learning achievement sharing 1
FIR滤波器设计(2)——Vivado调用IP核设计FIR滤波器
钓鱼邮件处置
网站服务器80,443端口一直被恶意攻击怎么办?
SQL Developer图形化窗口创建数据库(表空间和用户)
网络安全学习(二)
电脑系统没有standard tcp/ip port端口的处理操作
虹科分享 | 为什么说EtherCAT是提高控制系统性能的最佳解决方案?
TCP socket communication experiment
Sequence list and linked list
RAW高级套接口实验
Vivado IP核之RAM Block Memery Generator
On defect description style
三、广域通信网
什么是DNS放大攻击
MerkleTree 构建QT实现UI
[leetcode skimming] array 1 - double pointer
Vivado IP核之浮点数加减法 Floating-point
八、 网络安全