Gameplay

3/Gameplay/grid-small

How to DDos a websites


Distributed Denial-of-Service (DDoS)


 Attacks DDoS is a coordinated attack, launched using a large number of compromised hosts. At an initial stage, the attacker identifies the vulnerabilities in one or more networks for installation of malware programs in multiple machines to control them from a remote location. At a later stage, the attacker exploits these compromised hosts to send attack packets to the target machine(s), which is (are) usually outside the original network of infected hosts, without the knowledge of these compromised hosts. Depending on the intensity of attack packets and the number of hosts used to attack, commensurate damage occurs in the victim network. If the attacker can exploit a large number of compromised hosts, a network or a Web server may be disrupted within a short time. Some common examples of DDoS attacks are fraggle, smurf and SYN flooding. DDoS attack statistics up to the year 2014.


3 Causes of DDoS Attacks DDoS attacks


 are catastrophic and can bring down a server or network very quickly. Generally, a DDoS attacker forms (or hires) a network with compromised hosts to launch DDoS attacks. 

The attacker takes advantage of these compromised hosts to gather security related information. 

Eight prominent reasons for DDoS attacks are the following: (i) High interdependencies exist in Internet security. 

(ii) Internet resources are limited. 

(iii) Many unwittingly compromised hosts, puppeteered by one or more dangerous masters, conspire against a few targeted servers or hosts. 

(iv) Intelligence and resources that may be used to thwart impending attacks are not usually collected. 

(v) Simple and straightforward routing principles are used on the Internet.

 (vi) There are mismatches in design and speeds between core and edge networks are commonplace.

 (vii) Network management is frequently



Targets of DDoS Attacks Generally a DDoS attacker aims to attack any of the following targets: 

(i) Routers 

(ii) Links

 (iii) Firewalls and defense systems,

 (iv) Victim’s infrastructure 

(v) Victim’s OS

 (vi) Current communications

 (vii) Victim’s applications.



0 Comments:

Post a Comment