• It is stand for Distributed Denial-of-Service Attack.
  • In This the malicious user tries to make a Machin or network resource unavailable to user.
  • Distributed Denial-of-Service Attack, the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.
  • Distributed Denial-of-Service Attack (DDoS)attack occurs when multiple system flood the bandwidth or resources of a targeted system, usually one or more web servers.
  • it is a cybercrime in Which the hacker floods a server with Internet traffic to prevent users from accessing connected online services and sites.

How DDoS (Distributed Denial-of-Service Attack) attack works and explained ?

 Distributed Denial-of-Service Attack.
Distributed Denial-of-Service Attack

How many Types of Distributed Denial-of-Service Attack ?

There are 3 types of DDoS Attacks:

  1. Volume-based attacks :- The attacker simply sends a large volume of packets to the target thereby using up all the resources. The resources used might simply be bandwidth.
  2. Application layer attacks:- An application layer DDoS attack (sometimes referred to as layer 7 DDoS attack) is a form of DDoS attack where attackers target the application layer of the OSI model.
  3. Protocol attacks :-

DDoS attacks techniques :

  • ICMP Flood
  • UDP flood
  • Plashing
  • HTTP flood
  • Amplification Attack

DoS Attack techniques

  • Distributed DoS attack
  • Degradation-of-service attack.
  • Application layer floods
  • DDoS extortion
  • HTTP POST DoS attack
  • Internet Control Message Protocol (ICMP) flood.
  • R-U-Dead-Yet (RUDY)
  • Peer-to-peer attacks.
  • Permanent denial-of-service attacks.
  • Reflected / spoofed attack.
  • Teardrop attacks.
  • Telephony denial-of-service (TDOS).

DoS Attack tools

  • Nemesy
  • RUDY
  • GoldenEye
  • UDP flood
  • PyLoris
  • Tor’s Hammer
  • HULK, Blast
  • xerxes
  • The Low Orbit lon Cannon (LOIC)
  • HOIC
  • XOIC
  • Metasploit & more….

Basic Engineer

Hey Readers! We have more than fifteen years of experience in Software Development, IoT, Telecom, Banking, Finance and Embedded domain. Currently we are actively working on Data Science, ML and AI with multiple market leaders worldwide. Happy Reading. Cheers!

0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *