What is DDOS attack and what are the types?
Distributed Denial of Service, known as DDOS,
is a cyber-attack that makes movies and the Internet known. In other words,
this is a situation where all services are withheld. Here is a full explanation
of how this particular attack works and I also explored its various types.
What are DOS and DDOS?
To understand a DDOS
attack, it is important to understand the basics of a DOS
attack.
DOS - Denial of Service. This service can be anything but
imagine your mom confiscating your cellphone as she prepares for your exam to
help you with anxiety. Although her mother's wishes were not really taken care
of or concerned, she refused to call and other cell phone services.
While your computer and computer network or ethical hacking
may disable the service:
- Web server hijacking
- Ports with representation requests are overloaded and cannot use them
- Turn off wireless authentication
Dismiss all services offered on the Internet
Such an intentional attack can be performed from a machine.
While single-machine attacks are easier to perform and track, they are also
easier to detect and mitigate. To solve this problem, an attack can be carried
out from several devices spread over a wide area. This not only makes it
difficult to stop the attack but makes it impossible to find the main culprit.
These attacks are called distributed denial of service attacks or DDOS
attacks.
How does it work?
As explained, the main idea behind the denial
of service (DOS) attack is disabling the service. Because all
attacks actually work on the machine, the service may not be available if
machine performance can be reduced. This is the main backbone of DOS and DDOS.
Some DOS attacks are executed through server streams based
on connection requests until the server is overloaded and considered useless.
Others are executed by sending non-fragmented packets to a server that they
cannot control. These approaches increase the amount of damage caused by
potential botnets and their difficulty in phase mitigation.
We will investigate the different types to learn more about
how an attack works.
Types of DDOS attacks
While there are many ways to perform a DDOS attack, the list
is the most popular. These techniques have become popular due to their success
and damage. It is important to note that as technology advances, more creative
thinking has created more versatile ways to execute denial
of service attack.
The attacks are
described below:
Death ping
Depending on the TCP / IP protocol, the maximum packet size
can be 65,535 bytes. Death Attack ping uses this special fact. In this type of
attack, an attacker sends packets that exceed the maximum packet size when
adding packet fragments. Generally, computers do not know what to do with such
packages and they freeze or freeze completely.
Attacks that reflect
This type of attack is carried out by a botnet, also called
mirrors. The attacker sends a botnet connection request to several innocent
computers, apparently from the victim's machine (thereby destroying the
resource in the packet header). As a result, the IT team paid tribute to the
victims' team. Like many requests from different computers on the same
computer, it damages your computer and crashes. This type is also called Smurf
attack.
Mailbomb
Mail attacks typically attack mail servers. In these types
of attacks, instead of packets, an additional email, filled with random amounts
of spam, is sent to a dedicated email server. The mail server typically hangs
up because of a sudden peak of download and makes it useless until it is
repaired.
Teardrop
In this type of attack, packet clearing is misused. One of
the fields in the IP header is the "fragment deviation" field, which
indicates the source or compensation of the data contained in the fragment packet
relative to that of the original packet. If the sum of the displacement and the
size of the fragmented packet differ from the sum of the next fragment packet,
the packets overlap. When this happens, the server is vulnerable to drop
attacks and does not mount the packets, which results in denial of service.
Comments
Post a Comment