Need some simple explanation about DDOS

Asked By 0 points N/A Posted on -
qa-featured

Hi guys,

I need simple explanation about “Distributed Denial-Of-Service Attack (DDOS)”. I want to know, What is it? What are the strategies to protect against DDOS …. etc.

SHARE
Answered By 10 points N/A #195173

Need some simple explanation about DDOS

qa-featured

Hi Irish,

Distributed denial- of- service attack or DDoS attack is an attack causing denial of service to the targeted system or user causing the legitimate user/system to shut down. The typical DDoS attack, intruders will exploit the vulnerability of the computer and make it a DDoS master.

It is from the DDoS master system that the communication begins to compromise. A computer under the control of the intruder or DDoS master is called zombie or bot and the group is called botnet or Zombie Army. A botnet or zombie army is the biggest threat to internet security, not a virus, worm or spam. But, it can be prevented by Rackspace mitigation service namely:

Tier 1. Network-level traffic monitoring and analysis.

Tier 2. Server-level anomaly detection.

Tier 3. Traffic-filtering & re-routing.

If you have firewalls, switches, routers, application fonts end hardware, IPS based prevention, DDs based defense, blackholing and sinkholing and clean pipes. These can prevent too.

Answered By 590495 points N/A #93719

Need some simple explanation about DDOS

qa-featured

DDoS is the short term used for Distributed Denial of Service. It is a kind of attack on a website where it attempts to make an online service unavailable by overpowering it with traffic from multiple sources. The overflow of incoming messages directed to the target system basically forces it to shut down thus denying service to legit users to the system.

They aim for a wide variety of vital resources like news websites, banks, and currently a most important challenge to making sure people or users can access and publish significant information. In a normal DDoS attack, the attacker starts by taking advantage of a weakness or vulnerability in a computer system and making it the DDoS master.

The botmaster, which is the attack master, will identify and infect other vulnerable systems using malware. In the end, the attacker instructs or orders the controlled computers to commence an attack against a specific target. There are 2 types of DDoS attacks: one is the network-centric attack which overloads a service by consuming up the bandwidth, and the other is the application-layer attack that overloads a database or a service using application calls.

Related Questions