Skip to main content

DDOS (Distributed Denial-of-Service) Attack and its preventive measures🙌👀

 What is DDOS Attack??



Before knowing that lets know what is botnet?


Botnet is defined as group of internet connected devices. It is connection between the computers, smartphones, and IoT. Botnet is combination of one or more bots. 


Botnet Attack - Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.


DOS(Denial of Service) attack is cyberattack in which machine or network resource is made unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. As the name suggests DOS denial of service means the particular host/website which is connected to the internet disrupt causing a error.


Now lets learn about DDOS attack, DDOS means Distributed Denial-of-Service attack the incoming traffic flooding the victim originates from many different sources. Attempting to block a single source is not possible because there are multiple sources. DOS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and hacktivism can motivate these attacks.


Lets  now have an example, Imagine you are trying to book a concert ticket and there are very limited seats, and the one who wants to book a ticket are given a queue number for booking. The bad guys will flood with the attack all at once, to try to make the website too busy and slow it down or even make it stop working altogether.


On February 7, 2000, yahoo.com was brought to a halt for a few hours, as the victim of a distributed denial of service attack (DDoS).On the next day, its shares rose about $16, or 4.5 percent as the failure was blamed on hackers rather than on an internal glitch, unlike a fault with eBay earlier that year. 


How DDoS attacks work?


Attacker sends a large ping packet to the victim's machine. It causes the service to hang or crash.


There are few DOS attacks which are listed below


Land exploit is DOS attack in which a program sends a TCP SYN packet where the target and source addresses are the same and port numbers are same.


Smurf is DOS attack involved forged ICMP packets send to broadcast address.


SYN Attack floods a targeted system with a series of SYN packets.


Targa is program that can be used to run 8 different DOS Attacks.


and many more


To minimize the DOS Attack you could do the following measures Bandwidth limitations, Run the least of services, allow only necessary traffic, block IP Addresses.


The way this attack work, there is nothing that can be done to prevent a DOS entirely. we could definitely take precautionary steps.


Preventing the attack

  • Install The IDS (Intrusion detection system)
  • Use Scanning Tools (eg: Wireshark)
  • Keeping the network secure.

Comments

Popular posts from this blog

WHAT IS HTTP ?? HOW HTTP WORKS?

What is HTTP? HTTP is a protocol. HTTP stands for Hypertext standard protocol . It is defined as a set of rules used for communicating with servers while transmitting any message from client to server. then, what is HTTPS? HTTPS is a secure version of HTTP. "s" is Secure in HTTPS. In HTTPS the data sent is encrypted, so that people don't see the message transmitted over the network. By using the secured version the data sent or received is completely encrypted and no one can impersonate it. When we access a website, our browser sends requests to the server and then the server gives the response in the form of web pages. webpages consist of images, audio, video, html files, and more. How do we access a website? When we access a website, the browser sends a request to a web server and downloads the responses. You need to tell the browser specifically from where to access the resources, this is where the URLs help. URL is a uniform Resource Locator which gives instructio...

What is TCP/IP Model??

What is TCP/IP Model?? TCP stands for Transmission Control protocol/Internet Protocol . It is a communication protocol used to interconnect the devices in the internet. Initially, the Transmission Control Program provided only a common service to its users, not datagram. As experience with the protocol grew, functionality was divided into layers of distinct protocols, allowing users direct access to service.  TCP provides reliable, ordered delivery of  bytes between applications running on hosts communicating via network. TCP is connection oriented means a connection is established between a client and server before data is sent. The server waits for the connection requests from clients before any connection is formed.  TCP/IP has 5 layers  Application Layer : This layer allows the user to interact with the application.  Transport Layer : This layer is responsible for flow control, the data is sent through this layer. Network Layer : This layer is responsible f...

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it . Social engineering is a term we are hearing now a days a  lot. But  what is it?  Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions. Lets see few techniques with examples below Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person. Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number. Vishing also known as " voice phishing ", is again the same practice of revealing the information over a ...