Welcome to中国防火墙网
Add to Favorites | Chinese
Cannot not know the attack principle of DDoS and defence method
From;    Author:Stand originally
DoS attack, DDoS attack and DRDoS attack believed everybody has hear of already early! The logogram that DoS is Denial Of Service declines a service namely, and the logogram that DDoS is Distributed Denial Of Service is distributed decline a service, and the logogram that DRDoS is Distributed Reflection Denial Of Service, this is the meaning that distributinging reflex type rejects to serve.

Do not cross this 3 in attack method is the fiercest still is DDoS, although that DRDoS attack is the method of a kind of attack that goes out recently, but it is DDoS attack only be out of shape, its differ exclusively even if need not occupational and many “ fryer ” . The loophole that exploits TCP3 second handclasp has these 3 kinds of methods atttacking, it is about the same to their defense measure so.

DoS attack appears the earliest, its attack method spoken parts in an opera is sheet is carried, it is the machine performance that who compares good, rate is rapid. But present science and technology develops at full speed, general website lead plane has ten leader, and size of the processing capability of each lead plane, memory and network speed have flying development, some network bandwidth exceeded thousand level even. Such our man-to-man single charge that carry type do not have what action, do bad oneself machine child can die. Cite a such attack case, if every second can send your machine,10 offensive data is wrapped, and the machine that is atttacked by you (bandwidth of function, network is top) every second can be accepted and handle parcel of 100 attack data, in that way word, your attack was done not have with respect to what good, and the possibility that has dead opportunity very much. Want to know, if you deliver the attack of this kind of 1Vs1, the CPU of your machine takes up leading is 90% above, if your machine configures not quite tall word, then you were decided to death.

Nevertheless, science and technology is developing, the hacker's technology also is developing. so-called method is tall one feet, demon battles high. Become through countless machine, hackers find a kind of new DoS to atttack a method again eventually, this is DDoS attack. Its principle spoken parts in an opera is group of beat up, start DoS to atttack together to target machine with the machine of a lot of, but a lot of hackers do not participate in this together, this kind of attack just is operated by a hacker. This hacker is not to have a lot of machines, he is the “ fryer ” with a lot of more occupational on the network machine that carries him, and control these “ fryer ” will launch DDoS attack, or how be called distributed. Still be that a moment ago example, every second can send your machine bag of 10 attack data, and every second can accept the machine that is atttacked the data bag of 100, such your attack won't act well for certain, and your reoccupy stage or the 10 words that more machines will come to be atttacked to be being undertaken by the machine of punching bag, hey! As a result I did not say.
Previous12 3 Next

About us | Legal Notices | Sitemap | Links | Partner