- It is stand for Distributed Denial-of-Service Attack.
- In This the malicious user tries to make a Machin or network resource unavailable to user.
- Distributed Denial-of-Service Attack, the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.
- Distributed Denial-of-Service Attack (DDoS)attack occurs when multiple system flood the bandwidth or resources of a targeted system, usually one or more web servers.
- it is a cybercrime in Which the hacker floods a server with Internet traffic to prevent users from accessing connected online services and sites.
How DDoS (Distributed Denial-of-Service Attack) attack works and explained ?
How many Types of Distributed Denial-of-Service Attack ?
There are 3 types of DDoS Attacks:–
- Volume-based attacks :- The attacker simply sends a large volume of packets to the target thereby using up all the resources. The resources used might simply be bandwidth.
- Application layer attacks:- An application layer DDoS attack (sometimes referred to as layer 7 DDoS attack) is a form of DDoS attack where attackers target the application layer of the OSI model.
- Protocol attacks :-
DDoS attacks techniques :–
- ICMP Flood
- UDP flood
- Plashing
- HTTP flood
- Amplification Attack
DoS Attack techniques
- Distributed DoS attack
- Degradation-of-service attack.
- Application layer floods
- DDoS extortion
- HTTP POST DoS attack
- Internet Control Message Protocol (ICMP) flood.
- R-U-Dead-Yet (RUDY)
- Peer-to-peer attacks.
- Permanent denial-of-service attacks.
- Reflected / spoofed attack.
- Teardrop attacks.
- Telephony denial-of-service (TDOS).
DoS Attack tools
- Nemesy
- RUDY
- GoldenEye
- UDP flood
- PyLoris
- Tor’s Hammer
- HULK, Blast
- xerxes
- The Low Orbit lon Cannon (LOIC)
- HOIC
- XOIC
- Metasploit & more….
0 Comments