hello friends! new(ish)!
DDOS: Difference between revisions
>Mrsnooze m (fixed interwiki links) |
>GNUadeen m (Hacking is playful cleverness.) |
||
(One intermediate revision by one other user not shown) | |||
Line 3: | Line 3: | ||
A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a [[Botnet (Computer Network) | botnet]]), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective. | A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a [[Botnet (Computer Network) | botnet]]), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective. | ||
=Types of Denial of Service Attacks= | ==Types of Denial of Service Attacks== | ||
Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks. | Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks. | ||
=Use of a Denial of Service Attack= | ==Use of a Denial of Service Attack== | ||
A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. | A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. | ||
Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks | Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks | ||
=See Also= | ==See Also== | ||
* [[Wikipedia:Lizard_Squad |Lizard Squad]] DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody. | * [[Wikipedia:Lizard_Squad |Lizard Squad]] DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody. | ||
* Some | * Some cracker groups have offered [http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/dd4bc-group-targets-companies-with-ransom-driven-ddos-attacks/ DDoS for BitCoin]. | ||
[[Category:Terms]] | [[Category:Terms]] | ||
[[Category:Networking]] | [[Category:Networking]] | ||
[[Category:Security]] | [[Category:Security]] |
Latest revision as of 02:55, 10 May 2022
DDOS stands for Distributed Denial Of Service.
A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a botnet), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective.
Types of Denial of Service Attacks
Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks.
Use of a Denial of Service Attack
A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks
See Also
- Lizard Squad DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody.
- Some cracker groups have offered DDoS for BitCoin.