DDoS stands for Distributed Denial of Service. The translation is “distributed denial of service attack” and re-translated means that the server is attacked from many computers to stop its working. But still this does not lead us much about what a DDoS. To explain I’ll use a simple analogy in which our server is an auxiliary that serves people in a window.

Our assistant is very efficient and is able to accommodate several people at once without breaking a sweat: it is its normal load. But one day begin to get hundreds of people to the window to ask for things to our aid. And like any normal human, when busy nagging can not serve all and start addressing slower than normal. If it comes even more people will probably end up noses. At last, it will leave the window and no longer serve anyone else.

DDoS protection

On the server is the same: when there are too many requests it runs out of resources, hangs and stops working. You may goes directly or just stop responding connections. Either of the two forms, the server does not return to normal until the attack stops, either because the attackers have stopped or because I managed to block illegitimate connections and restart everything has stopped working. If you would like to know brief information about ddos protected servers you could choose here.

This is the basic concept of DDoS, but can be modified to make it more effective. For example, you can send the data very slowly causing the server consume more resources per connection, or alter the packets so that the server is left waiting indefinitely for a reply from an IP false.

As the basic concept of DDoS is simple, make attacks is relatively easy. In fact, it would be that there was a large enough number of people recharging the web continuously to throw. However, the tools that are commonly used are somewhat more complex. With them you can create many simultaneous connections or altered send packages with techniques. They also allow change packages as source IP putting a fake IP, so that they can not detect who the real attacker.

Another technique for carrying out the DDoS is to use botnets: networks infected by a Trojan and an attacker can remotely control computers. In this way, cluttering the server computers are people who know they are participating in a DDoS attack, so it is harder to find the real attacker.

Types of DDoS attacks:

Based on volume: in this case the purpose of the attack is to saturate the bandwidth of a website that is the goal. The idea is to cause congestion.

Protocol attacks: this type of attack consumes resources on the server or a service that works as an intermediary such as a firewall or load balancing . This attack can knock up services that are able to maintain million active connections stably.

Application layer attacks: this requests that are disguised as legitimate or innocent but in order to make the Web server to stop working users are used.

  • Thanks a lot for reading my Distributed Denial of Service related article. Hope read and enjoy!