Home Operation and Maintenance Safety What are the attack methods of Ddos?

What are the attack methods of Ddos?

May 19, 2023 pm 04:10 PM
ddos

The three attack methods of ddos ​​are: 1. SYN/ACK Flood attack; mainly by sending a large number of SYN or ACK packets with forged source IPs and source ports to the victim host, causing the host's cache resources to be exhausted or Busy sending response packets causing denial of service. 2. TCP full connection attack; it is designed to bypass conventional firewall inspections. 3. Script attack; characterized by establishing a normal TCP connection with the server and constantly submitting queries, lists and other calls that consume a large number of database resources to the script program.

The most troubling thing about websites is attacks. Common attack methods on servers include port penetration, password cracking and DDOS attacks. Among them, DDOS is currently the most powerful and one of the most difficult to defend attacks.

So what is a DDOS attack?

The attacker forged a large number of legitimate requests and used network bandwidth as a means to bring the website down, making the website inaccessible. Its characteristic is that the cost of defense is far higher than the cost of attack. A hacker can easily launch a 10G or 100G attack, but the cost of defending against 10G or 100G is very high.

DDOS attack was originally called DOS (Denial of Service) attack. Its attack principle is: you have a server, I have a personal computer, and I will use my personal computer to send messages to your server. A large amount of junk information congests your network, increases the burden on you to process data, and reduces the efficiency of the server CPU and memory.

DDOS is brought about by technological advancement, because current defense methods can easily defend against one-to-one attacks similar to DOS. The principle is the same as DOS, but the difference is that DDOS attacks are many-to-one attacks, and even tens of thousands of personal computers can attack a server using DOS attacks at the same time, eventually causing the attacked server to become paralyzed.

Three common DDOS attack methods

SYN/ACK Flood attack: The most classic and effective DDOS attack method, which can kill all kinds of attacks System network services. Mainly by sending a large number of SYN or ACK packets with forged source IPs and source ports to the victim host, causing the host's cache resources to be exhausted or busy sending response packets, causing a denial of service. Since the sources are all forged, it is difficult to track. The disadvantage is that it is difficult to implement and requires high-bandwidth zombie host support.

TCP Full Connection Attack: This attack is designed to bypass the inspection of conventional firewalls. Under normal circumstances, most conventional firewalls have the ability to filter DOS attacks such as TearDrop and Land. But normal TCP connections are ignored. As everyone knows, the number of TCP connections that many network service programs (such as IIS, Apache and other web servers) can accept is limited. Once there are a large number of TCP connections, even if they are normal, they will As a result, website access is very slow or even inaccessible. A TCP full connection attack uses many zombie hosts to continuously establish a large number of TCP connections with the victim server until the server's memory and other resources are exhausted and dragged across, causing a denial of service. The characteristic of the attack is that it can bypass the protection of general firewalls to achieve the purpose of the attack. The disadvantage is that it needs to find many zombie hosts, and because the IPs of the zombie hosts are exposed, this type of DDOS attack method is easy to be tracked.

Script script attack: This attack is mainly designed for website systems that have script programs such as ASP, JSP, PHP, CGI, etc., and call databases such as MSSQLServer, MySQLServer, Oracle, etc. , characterized by establishing a normal TCP connection with the server, and constantly submitting queries, lists and other calls that consume a large number of database resources to the script program. It is a typical attack method with a small and broad approach.

How to defend against DDOS attacks?

Generally speaking, we can start from three aspects: hardware, a single host, and the entire server system.

1. Hardware

1. Increase bandwidth

Bandwidth directly determines the ability to withstand attacks. Increasing bandwidth hard protection is the theoretical optimal solution. As long as the bandwidth is greater than the attack traffic, you are not afraid, but the cost is very high.

2. Improve hardware configuration

Under the premise of ensuring network bandwidth, try to improve the configuration of hardware facilities such as CPU, memory, hard disk, network card, router, and switch, and choose well-known and reputable hardware. Good product.

3. Hardware firewall

Place the server in a computer room with a DDoS hardware firewall. Professional-grade firewalls usually have the function of cleaning and filtering abnormal traffic, and can fight against traffic-based DDoS attacks such as SYN/ACK attacks, TCP full connection attacks, script attacks, etc.

2. Single host

1. Repair system vulnerabilities in a timely manner and upgrade security patches.

2. Close unnecessary services and ports, reduce unnecessary system add-ons and self-starting items, minimize the number of processes executing in the server, and change the working mode

3. iptables

4. Strictly control account permissions, prohibit root login, password login, and modify the default ports of commonly used services

3. The entire server system

1. Load balancing

Use load balancing to evenly distribute requests to various servers, reducing the burden on a single server.

2、CDN

CDN is a content distribution network built on the Internet. It relies on edge servers deployed in various places and uses the distribution, scheduling and other functional modules of the central platform to enable users to obtain the content they need nearby, reduce network congestion, and improve user access response. Speed ​​and hit rate, so CDN acceleration also uses load balancing technology. Compared with high-defense hardware firewalls, it is impossible to withstand unlimited traffic restrictions, but CDN is more rational and shares penetration traffic with multiple nodes. Currently, most CDN nodes have a 200G traffic protection function. Coupled with hard defense protection, it can be said that It can cope with most DDoS attacks.

3. Distributed cluster defense

The characteristic of distributed cluster defense is that multiple IP addresses are configured on each node server, and each node can withstand DDoS attacks of no less than 10G. If a node is unable to provide services under attack, the system will automatically switch to another node according to the priority setting and return all the attacker's data packets to the sending point, paralyzing the attack source.

Is ddos ​​an active attack?

Yes.

DDoS is the abbreviation of Distributed denial of service attack. Distributed denial of server attack (hereinafter referred to as DDoS) is a type of network attack that can cause many computers (or servers) to be attacked at the same time, making the attacked target unable to use normally.

DDoS attacks have appeared countless times on the Internet. Even large companies such as Google and Microsoft have been hit by DDoS attacks. It is a relatively common type of network attack.

The above is the detailed content of What are the attack methods of Ddos?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Repo: How To Revive Teammates
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to use Nginx and Nginx Plus to resist DDOS attacks How to use Nginx and Nginx Plus to resist DDOS attacks May 14, 2023 pm 08:34 PM

1. Characteristics of application layer DDoS attacks. Application layer (seventh layer/http layer) DDoS attacks are usually initiated by Trojan horse programs, which can be designed to better exploit the vulnerabilities of the target system. For example, for a system that cannot handle a large number of concurrent requests, just by establishing a large number of connections and periodically sending out a small number of data packets to maintain the session, the system's resources can be exhausted, making it unable to accept new connection requests to achieve the purpose of DDoS. Other attacks include sending a large number of connection requests to send large data packets. Because the attack is initiated by a Trojan horse program, the attacker can quickly establish a large number of connections and issue a large number of requests in a short period of time. The following are some DDoS characteristics. We can use these characteristics to resist DDoS (including

Nginx security practice: preventing DDoS attacks Nginx security practice: preventing DDoS attacks Jun 11, 2023 am 08:13 AM

With the development of the Internet, network attack methods have become more and more diverse, including DDoS attacks. This attack method uses multiple attack sources to initiate a large number of requests to the target server at the same time, causing the server to be overwhelmed and unable to work properly. . Therefore, protecting the server is very important for some important websites. As a high-performance, cross-platform web server and reverse proxy server, Nginx can help us resist DDoS attacks. The following will summarize the security practices of Nginx to prevent D

What are the attack methods of Ddos? What are the attack methods of Ddos? May 19, 2023 pm 04:10 PM

The three attack methods of DDoS are: 1. SYN/ACKFlood attack; mainly by sending a large number of SYN or ACK packets with forged source IPs and source ports to the victim host, causing the host's cache resources to be exhausted or busy sending response packets to cause rejection. Serve. 2. TCP full connection attack; it is designed to bypass conventional firewall inspections. 3. Script attack; characterized by establishing a normal TCP connection with the server and constantly submitting queries, lists and other calls that consume a large number of database resources to the script program. The biggest headache for websites is being attacked. Common server attack methods mainly include the following: port penetration, port penetration, password cracking, and DDOS attacks. Among them, DDOS is currently the most powerful and the most

Microsoft sets defense record in response to 3.47 Tbps DDoS attack Microsoft sets defense record in response to 3.47 Tbps DDoS attack Apr 22, 2023 am 08:52 AM

Microsoft inadvertently set a new record last November when it mitigated a 3.47Tbps DDoS (distributed denial of service) attack. In a blog post, the Redmond giant shared Azure DDoS protection data for the third quarter of 2021. The company noted that the number of DDoS attacks increased in the second half of 2021. DDoS is a popular attack method that anyone can use due to the low price of attack services. In the second half of 2021, Microsoft mitigated an average of 1,955 attacks per day, an increase of 40% from the first half of the year. However, this pales in comparison to the 4,296 attacks mitigated on August 10, 2021. Overall,

Suzhou game customer server hosting to prevent DDOS attacks, which computer room is suitable? Suzhou game customer server hosting to prevent DDOS attacks, which computer room is suitable? Feb 27, 2024 pm 07:13 PM

With the rapid development of AI artificial intelligence, short video, live broadcast industry and game industry, server hosting has become a necessary choice for many enterprises. However, as network attacks become increasingly rampant, DDOS attacks have become a problem that cannot be ignored in hosting services. Suzhou is an important IT city in China, and many enterprises and game customers choose to host servers here. In order to ensure the security of the server, it is crucial to develop an effective anti-DDOS attack plan. Suzhou server hosting to prevent DDOS attacks 1. Understand DDOS attacks First, we need to have an in-depth understanding of the principles of DDOS attacks. DDOS, a distributed denial of service attack, congests the server with a large number of legitimate or malicious requests, making it inaccessible to normal users. This type of attack comes in various forms, and the most common ones are

What are the three attack methods of DDoS? What are the three attack methods of DDoS? Jan 29, 2023 pm 05:25 PM

The three attack methods of DDoS are: 1. SYN/ACK Flood attack; mainly caused by sending a large number of SYN or ACK packets with forged source IPs and source ports to the victim host, causing the host's cache resources to be exhausted or busy sending response packets. Denial of service. 2. TCP full connection attack; it is designed to bypass conventional firewall inspections. 3. Script attack; characterized by establishing a normal TCP connection with the server and constantly submitting queries, lists and other calls that consume a large number of database resources to the script program.

Seven myths and misconceptions about robot attacks Seven myths and misconceptions about robot attacks Apr 12, 2023 pm 06:49 PM

Although bot attacks are more common than ever, there are some unsubstantiated myths surrounding them. By understanding these myths, you'll be better able to protect your website from potential damage and keep your customers happy. Here are seven of the most common robot myths and their truths. 1. Firewalls will stop sophisticated bot attacks 73% of enterprises believe legacy WAFs will protect them from bot attacks. A WAF is one of the first lines of defense for protecting web applications. It covers the most critical risks, including but not limited to the OWASP Top 10. WAF can be used to block malicious bots by creating WAF rules. Its basic mitigations include applying rate limiting to manage suspicious IPs

DDoS attack protection and network security configuration recommendations in PHP Huawei Cloud API interface docking DDoS attack protection and network security configuration recommendations in PHP Huawei Cloud API interface docking Jul 05, 2023 pm 08:02 PM

DDoS attack protection and network security configuration recommendations in PHP Huawei Cloud API interface docking With the rapid development of cloud computing, more and more enterprises choose to migrate their business to cloud platforms. As a leading cloud service provider, Huawei Cloud provides a wealth of cloud computing products and services. Security has always been an important issue during the docking process of PHP Huawei Cloud API interface. This article will focus on how to ensure system security by configuring Huawei Cloud's DDoS attack protection function and network security settings. And combined with code examples, we provide

See all articles