hello friends! new(ish)!
DDOS: Difference between revisions
>Mrsnooze m (fixed interwiki links) |
>Se7en1 mNo edit summary |
||
Line 3: | Line 3: | ||
A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a [[Botnet (Computer Network) | botnet]]), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective. | A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a [[Botnet (Computer Network) | botnet]]), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective. | ||
=Types of Denial of Service Attacks= | ==Types of Denial of Service Attacks== | ||
Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks. | Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks. | ||
=Use of a Denial of Service Attack= | ==Use of a Denial of Service Attack== | ||
A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. | A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. | ||
Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks | Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks | ||
=See Also= | ==See Also== | ||
* [[Wikipedia:Lizard_Squad |Lizard Squad]] DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody. | * [[Wikipedia:Lizard_Squad |Lizard Squad]] DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody. | ||
* Some hacker groups have offered [http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/dd4bc-group-targets-companies-with-ransom-driven-ddos-attacks/ DDoS for BitCoin]. | * Some hacker groups have offered [http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/dd4bc-group-targets-companies-with-ransom-driven-ddos-attacks/ DDoS for BitCoin]. |
Revision as of 06:55, 30 March 2019
DDOS stands for Distributed Denial Of Service.
A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a botnet), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective.
Types of Denial of Service Attacks
Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks.
Use of a Denial of Service Attack
A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks
See Also
- Lizard Squad DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody.
- Some hacker groups have offered DDoS for BitCoin.