Distributed network attacks are often referred to as distributed denial of service (DDoS) attacks. This type of attack takes advantage of the specific capacity limits that apply to any network resource, such as the infrastructure that enables the company website. The DDoS attack sends multiple requests to the attacked web resource, with the intention of overwhelming the website’s ability to handle multiple requests and preventing the website from functioning properly.

The most common targets of DDoS attacks include:

Internet shopping sites

Online casinos

Any company or organization that depends on the provision of online services.

DoS attacks are generated by saturating the ports with multiple information flows, causing the server to become overloaded and unable to continue providing its service. That is why it is called denial, as it makes the server unable to service the huge number of requests. This technique is used by hackers to take target servers out of service.

At a global level, this problem has been growing, in part due to the greater ease of creating attacks and also due to the greater number of computers available that are poorly configured or with security flaws that are exploited to generate these attacks. There is an increase in reflection and amplification attacks over the use of botnets.

This practice is carried out by generating a large flow of information from various connection points to the same destination point. The most common way to perform a DDoS is through a botnet, this technique being the most common and effective cyber attack due to its technological simplicity.

DoS attacks can be perpetrated in a number of ways. Although they basically consist of:

Consumption of computational resources, such as bandwidth, disk space, or processor time.

Alteration of configuration information, such as routing route information.

Alteration of state information, such as interruption of TCP sessions (TCP reset).

Disruption of physical network components.

Obstruction of means of communication between users of a service and the victim, so that they can no longer communicate properly.


Un comentario en «DDoS or Denial of service attack»

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *