Distributed DOS Attacks Destroy Everything

Today’s topic is very popular,

What is a DDOS attack?

In digital computing world, a DDOS or denial-of-service attack (DoS attack) is one of ruthless cyber-attack, attacker make system or network resources unavailable temporary or disturbing host based services.

denial-of-service attack

Basically, what is happened in ddos attack, attackers creates multiple resources or multi request send continuously to targeted machine to overload system.

In simple networking terms, denial of service means attackers creates multiple data packets and create new request for every packets to the targeted server and at the other end receiver server open the connection and never closed until all packet received (Networking Layers) and that makes system engage with this established connection and if new request is coming it will automatically denied by server, due to unavailable of network nodes.

Run Ping Test to identify Resources has not caught by distributed denial of service attack

In networking world, there was a utility to determine if server or ip available to accept a connection and how much time it will take to reach at destination.

You can run ping test from your CMD panel or Unix CMD panel, type ping and put ip address and in return you will get data packet details and estimated time, this is not exactly data packet, but it’s a empty packet named as ECHO packet, does not containing any data, but destination has to accept this and respond on this.

Distributed Denial of Service

In Distributed denial-of-service (DDOS attack) where an attacker uses many IP addresses to generate multiple requests at a time from multiple locations. Most of time attackers use IP Spoofing techniques, in which this technique is popularly used to gain access to a system or machine without authorized way. With this technique multiple echoes a packet has been generated with false IP address as well as modified header packet.

Application layer attacks

In application layer ddos attacks, an attack happens on layer 7 of OSI model.

Http Post (Distributed Denial of Service Attack)

http post dos attack first identify back in 2009, in this scenario sender change http header packet, content body, time etc. this modified packet contain time limit at extreme low rate 1 byte / 110 seconds. So due to complete packet being received destination, connection remain and wait for entire message to complete, it s really long time till connection remain open. Attackers apply same trick to generate all resources, which leads to engage server connection and that effects on CPU as well as increase bandwidth consumption to handle this. Apache handle request packets up to 2GB in size.

Dos Attack Prevention (Distributed Denial of Service)

Cloudflare is well known company specialized in network security, this act as gateway before establishing connection over the network. If Cloudflare find the data packet error free, then you can proceed to connect, otherwise it will break connection.

Share This Post

14 comments

  1. We’re a group of volunteers and starting a new scheme in our community.

    Your site offered us with valuable info to work
    on. You have done a formidable job and our entire community will
    be thankful to you.

  2. I absolutely love your website.. Great colors & theme.
    Diid you make this skte yourself? Please reply back
    as I’m planning to create my very own website and want to find out where you got this from or just what the theme is called.
    Cheers!

  3. Thanks for sharing your info. I truly appreciate your efforts and I will be waiting for
    your further write ups thanks once again.

  4. Woah! I’m really loving the template/theme of this
    blog. It’s simple, yet effective. A lot of times it’s difficult to get that “perfect balance” between usability and appearance.

    I must say you’ve done a fantastic job with this. Additionally, the
    blog loads extremely fast for me on Opera. Superb Blog!

  5. Hmm it appears like your website ate my first comment (it was super
    long) so I guess I’ll just sum it up what I submitted and say, I’m thoroughly enjoying your blog.
    I as well am an aspiring blog blogger but I’m still new to everything.
    Do you have any helpful hints for first-time blog writers?

    I’d genuinely appreciate it.

  6. Hi! I know this is kinda off topic but I’d figured I’d ask.
    Would you be interested in exchanging links or
    maybe guest authoring a blog post or vice-versa?
    My site addresses a lot of the same subjects as yours and I
    believe we could greatly benefit from each other.

    If you happen to be interested feel free to send me an e-mail.
    I look forward to hearing from you! Fantastic blog
    by the way!

  7. What’s up, this weekend is pleasant in favor of me, for
    the reason that this time i am reading this wonderful educational article here
    at my residence.

  8. An impressive share! I’ve just forwarded this onto a friend who has been doing
    a little homework on this. And he actually ordered me dinner
    because I found it for him… lol. So allow me to
    reword this…. Thank YOU for the meal!! But yeah, thanks for spending some time to discuss this matter here on your internet site.

  9. I am sure this paragraph has touched all the internet viewers, its
    really really fastidious post on building up new weblog.
    It is appropriate time to make some plans for the longer term and
    it is time to be happy. I’ve read this submit and if I could
    I desire to recommend you few attention-grabbing things or advice.

    Perhaps you could write subsequent articles regarding this article.
    I wish to learn more things approximately it! I’ve been surfing online
    more than 2 hours today, yet I never found any interesting article like yours.
    It is pretty worth enough for me. In my view, if all web owners and bloggers
    made good content as you did, the net will be a lot more useful than ever before.

  10. continuously i used to read smaller content that as well clear their motive,
    and that is also happening with this post
    which I am reading here.

Leave a Reply

Your email address will not be published. Required fields are marked *