当前位置:网站首页>The difference between DDoS attack and CC attack
The difference between DDoS attack and CC attack
2022-07-29 06:34:00 【Zhongyun era - defense testable - Xiaoyu】
What is? CC attack ?
1.CC From the attack IP It's all true , Scattered ;
2.CC The attack packets are normal packets ;
3.CC The request to attack , All valid requests , A request that cannot be refused ;
4. because cc The attack is a web page , The server can connect to everything ,ping Also no problem , But Web pages just can't be accessed ;
5. however iis As soon as the server is turned on, it will die , And after being attacked, I always lose my bag . I don't know cc attack ,syn The attack frequency is 78ack Attack frequency 663.
Difference between them :
DDoS Is aimed at IP The attack of , and CC The attack is a web page .
Preventive measures :
At present, the network security community is concerned with DDoS There is still no good way to prevent , It mainly depends on routine maintenance and scanning . The effect of simple software prevention is not obvious , Among all the defense measures, hardware security facilities ( Hardware firewall ) Is the most effective , But hardware firewalls don't mean that they can stop all attacks , It can only reduce the attack level ,DDoS The attack can only be reduced , Can't be completely eliminated .
CC Unlike DDoS You can use a hardware firewall to filter attacks ,CC The request of the attack itself is a normal request , Hardware firewall can not play a good defense effect on him . If it is easy to be CC attack , It is recommended to install soft defense in advance .
边栏推荐
- [leetcode skimming] array 1 - double pointer
- 网络安全学习(二)
- 虹科Automation softPLC | MoDK运行环境与搭建步骤(1)——运行环境简介
- Official tutorial redshift 08 light
- Idea installing Scala
- Design and simulation code of 4-bit subtracter based on FPGA
- 虹科分享 | 如何测试与验证复杂的FPGA设计(1)——面向实体或块的仿真
- Advanced socket programming (options and control information)
- Circular linked list and bidirectional linked list
- Webshell管理工具的流量特征
猜你喜欢

网络安全学习(二)

day15_泛型

Vivado IP核之RAM Block Memery Generator

Unity中简单的cubecap+fresnel shader的实现

软件测试的优势有哪些?看看你了解多少.....

day06_类与对象

虹科白皮书 | 在工业4.0阶段,如何利用TSN时间敏感网络技术打造数字化工厂?

day09_static&final&代码块&抽象类&接口&内部类

使用STP生成树协议解决网络中的二层环路问题
![[interview questions] the latest software test interview questions in 2022 (400) [with answers] continue to update](/img/72/445d78bdd6c921cc5a0843f056c435.png)
[interview questions] the latest software test interview questions in 2022 (400) [with answers] continue to update
随机推荐
Why are the job requirements for software testing in 2022 getting higher and higher? Is there any secret in it?
RAW高级套接口实验
网络安全学习(一)
Vivado IP核之浮点数开方 Floating-point
五、 无线通信网
day12_多线程
子网数、主机数与子网掩码的关系
Webshell管理工具的流量特征
Arrays&Object&System&Math&Random&包装类
九、 组网技术
day06_类与对象
模型空间下的旋转和世界空间下的旋转
文件系统一
Sequence list and linked list
虹科分享 | 带你全面认识“CAN总线错误”(二)——CAN错误类型
电脑系统没有standard tcp/ip port端口的处理操作
Vivado IP核之复数浮点数除法 Floating-point
虹科为您分享EtherCAT demo,教您如何从其他协议快速过渡到EtherCAT工业总线
四、 局域网和城域网
虹科分享 | FPGA 实现的直通与存储转发切换延迟