What is DDOS attack and what are the types?



Distributed Denial of Service, known as DDOS, is a cyber-attack that makes movies and the Internet known. In other words, this is a situation where all services are withheld. Here is a full explanation of how this particular attack works and I also explored its various types.

What are DOS and DDOS?

To understand a DDOS attack, it is important to understand the basics of a DOS attack.
DOS - Denial of Service. This service can be anything but imagine your mom confiscating your cellphone as she prepares for your exam to help you with anxiety. Although her mother's wishes were not really taken care of or concerned, she refused to call and other cell phone services.

While your computer and computer network or ethical hacking may disable the service:
  • Web server hijacking
  • Ports with representation requests are overloaded and cannot use them
  • Turn off wireless authentication

Dismiss all services offered on the Internet

Such an intentional attack can be performed from a machine. While single-machine attacks are easier to perform and track, they are also easier to detect and mitigate. To solve this problem, an attack can be carried out from several devices spread over a wide area. This not only makes it difficult to stop the attack but makes it impossible to find the main culprit. These attacks are called distributed denial of service attacks or DDOS attacks.

How does it work?

As explained, the main idea behind the denial of service (DOS) attack is disabling the service. Because all attacks actually work on the machine, the service may not be available if machine performance can be reduced. This is the main backbone of DOS and DDOS.

Some DOS attacks are executed through server streams based on connection requests until the server is overloaded and considered useless. Others are executed by sending non-fragmented packets to a server that they cannot control. These approaches increase the amount of damage caused by potential botnets and their difficulty in phase mitigation.

We will investigate the different types to learn more about how an attack works.

Types of DDOS attacks

While there are many ways to perform a DDOS attack, the list is the most popular. These techniques have become popular due to their success and damage. It is important to note that as technology advances, more creative thinking has created more versatile ways to execute denial of service attack.

The attacks are described below:

Death ping

Depending on the TCP / IP protocol, the maximum packet size can be 65,535 bytes. Death Attack ping uses this special fact. In this type of attack, an attacker sends packets that exceed the maximum packet size when adding packet fragments. Generally, computers do not know what to do with such packages and they freeze or freeze completely.

Attacks that reflect

This type of attack is carried out by a botnet, also called mirrors. The attacker sends a botnet connection request to several innocent computers, apparently from the victim's machine (thereby destroying the resource in the packet header). As a result, the IT team paid tribute to the victims' team. Like many requests from different computers on the same computer, it damages your computer and crashes. This type is also called Smurf attack.

Mailbomb

Mail attacks typically attack mail servers. In these types of attacks, instead of packets, an additional email, filled with random amounts of spam, is sent to a dedicated email server. The mail server typically hangs up because of a sudden peak of download and makes it useless until it is repaired.

Teardrop

In this type of attack, packet clearing is misused. One of the fields in the IP header is the "fragment deviation" field, which indicates the source or compensation of the data contained in the fragment packet relative to that of the original packet. If the sum of the displacement and the size of the fragmented packet differ from the sum of the next fragment packet, the packets overlap. When this happens, the server is vulnerable to drop attacks and does not mount the packets, which results in denial of service.

Comments

Popular posts from this blog

NOC for 24×7 IT Infrastructure Monitoring and Management

All you need to know about Network Design & Network Planning

All you need to know about a Network Operation Center Technician career