What is DDOS attack and their types explained
Q. What is DOS ?
Often you will hear DOS, pronounced phonetically altogether, i.e. 'DOS' and not D.O.S. and DDOS is pronounced dee-dos.
A denial of service attack is when an attacker is trying to generate more traffic than you have resources to handle...."
Q. What is DDOS ?
A ddos attack is the same, but is amplified. Rather than one computwer and one internet connection on a DDOS, and often involves millions of computers all being used in a distributed fashion to have the effect of knocking a web site, web application or network offline.
NOTE: in both instances, either by the singular or the multiple DOS attack, the target is bomberded with data requests that have the effect of disabling the functionality of the victim.
Types of DDOS/DOS Attacks or method
1. SYN Flood
A SYN flood is a type of DOS attack in which an attacker sends a series of SYN requests to a target's system in an attempt to use vast amounts of server resources to make the system unresponsive to legitmate traffic.
2. Teardrop attack
A teardrop attacks involves the hacker sending broken and disordanized IP fragments with overlapping, over-sized payloads to the victims machine. The intension is to obviously crash operating systems and servers due to a bug in the way TCP/IP fragmentation is re-assambled. All operating systems many types of servers are vulnerable to this type of DOS attack, includiong Linux.
3. Low-rate DOS attack
Don't be fooled by the title, this is still a deadly DOS attack! The low-rate DOS(LDOS) attack is designed to exploit TCP's slow-time-scale dynamics of being able to execute the retranmission time-out(RTO) mechanism to reduce TCP throughput. in short, a hacker can create a TCP overflow by repeatedly entering a RTO throughput at the victim node will be drastically reduced while the hacker will have low average rate thus making it difficult to be detected.
4. SMURF
This type of attack uses large amounts of internet control message protocol(ICMP) ping traffic target at an internet broadcast address. The reply IP[ address is spoofed to that of the intended victim. All the replies are sent to the victim instead of the IP used for the pings. Since a single internet broadcast address can support a maximium of 255 hosts, a smurf attack amplifies a single ping 255 times. The effecty of this is slowing down the network to a point where it is impossible to use it.
5. Peer-to-peer attacks
A peer-to-peer(P2P) networkis a distributed network in which individual nodes in the network (called"peers") act as both suppliers(seeds) and consumers(leeches) of resources, in constrast to the centralized client-server model where the client-server or operating system nodes requests access to resources provided by central servers.
Hope, you learned something new!
Comments
Post a Comment