What everyone needs to know about DDos?
DDoS stands for Distributed Denial of Service. A malicious hacker uses a DDoS attack to form a computer resource (i.e. – website, application, e-mail, voicemail, network) stop responding to legitimate users. The malicious hacker will this by commanding a fleet of remotely-controlled computers to send a flood of network traffic to the target. The target becomes therefore busy dealing with the attacker’s requests that it doesn’t have time to reply to legitimate users’ requests. that can cause the target system to prevent responding, resulting in long delays and outages.
What is a distributed attack?
One DDoSer can do a lot of injury. These denial of service attacks area unit known as distributed as a result of they are available from several computers right away. A DDoSer controls an outsized variety of computers that have been infected by a Trojan virus. The virus is a small application that allows remote command-and-control capabilities of the computer while not the user’s information.
What is a zombie and a botnet?
The virus-infected computers area unit known as zombies – as a result of they are doing whatever the DDoSer commands them to try and do. an outsized cluster of zombie computers is termed a robot network, or botnet.
Your computer may well be part of a botnet while not your information. you might not notice any distinction, or you may notice your computer is not as fast as it accustomed be. That’s as a result of it should be busy participating during a DDoS attack at the same time you are victimisation it. Or, you might determine that your computer is infected once your web service supplier (ISP) drops your service as a result of your computer is causation an unusually high variety of network requests.
What is a DDoS command-and-control server?
Zombie computers during a botnet receive directions from a command and control server, that is an infected net server. DDoSers WHO have access to a command and control (C&C or CC) server can recruit the botnet to launch DDoS attacks. Prolexic has known quite 4,000 command-and-control servers and quite 10 million zombies worldwide. we track them and give notice enforcement to disable them once potential.
Many types of DDoS attacks
There area unit many types of DDoS attacks. they aim totally different network parts – routers, appliances, firewalls, applications, ISPs, even knowledge centers – in numerous ways that. there's no simple way to prevent DDoS attacks, however Prolexic has a tried DDoS protection approach that works to minimize the harm and let your system keep working during an attack.
DDoS attackers use a variety of DDoS attack ways. The malicious hacker cluster Anonymous, for instance, started with a tool that would launch Layer 7 DDoS attacks and Layer 3 DDoS attacks from any computer. These attacks had a typical attack signature – that's, common code. As a result, the attacks may well be detected and satisfied (stopped) fairly easily.
It’s a game of cat and mouse. The cat learns concerning what the mouse is doing, so the mouse changes ways to avoid obtaining caught. DDoSers got smarter and began randomizing their attack signatures and encrypting their code. Some even started victimisation browsers to visit an internet page and feed harmful code to an internet application on the positioning.
Although application-layer DDoS attacks area unit tougher to recognize, DDoS mitigation experts in our Security Operations Center (SOC) recognize what to seem for – and we area unit continuously looking. Our anti-DDoS experts monitor and analyze these attacks all the time– day and night – and block the DDoS attacks that target our purchasers.
What area unit application layer 7 DDoS attacks?
Application layer 7 (L7) attacks may not produce such high volumes of network traffic, however they'll hurt your website during a a lot of devastating means. they may activate some aspect of an internet application, like posting totally different user names and passwords, or targeting a pushcart or computer program.
Many of the status e-Commerce outages area unit the results of Layer 7 application attacks. the most important issue is that Layer 7 attacks change and randomise in no time. anything a traveler can access an offender can too – and it looks the same to an IT administrator.
Source : Prolexic