Welcome to中国防火墙网
Add to Favorites | Chinese
Defence DDoS is distributed decline a service
From;    Author:Stand originally
DDoS is distributed stop to serve attack to regard optional of behavior of hacker, politics hacker and international computer terrorist as a kind of weapon and appear. DDoS punching bag is not the server of individual website or other network brim merely, what they conquer is network itself. Attack points to the infrastructure of the network explicitly, for example the concentration in provider network or core road by implement, DNS server. October 2002, clumsy DDoS atttacks 8 in affecting server of 13 roots DNS(Domain Name Sevice) , the crucial system that regards whole Internet as communication guide suffers serious destruction, cannot provide active service, of business always afterwards sex cannot get assuring.

Serve the aggravate that provider, enterprise and government organization depend on to Internet, make successful DDoS is atttacked (economy and other respect) can cause more serious destruction. Recently since, appeared the DDoS tool with more more powerful function, make the attack in the future ruinous bigger.

Because DDoS attack often adopts lawful data to request a technology, plus machine of a few tool, causing DDoS to atttack is current one of Internet attack of the most difficult defence, how to use the most appropriate, effective method will answer them, posed an enormous challenge to the organization that relies on Internet and orgnaization. Traditional network equipment and circumjacent and safe technology, for example firewall and IDSs(Intrusion Detection Systems) , rate limitation, receive limitation to wait to all cannot provide the very effective protection that atttacks in the light of DDoS. Face the concussion of current DDoS, should protect Internet to last effectiveness, next generation architecture that need can detect and prevent attack of sex of increasingly tricky, complex, deceit and technology.

DDoS is minatory

DDoS atttacks direct thousands of target of certain of puppet leader launch an offensive. These puppet leader are from number with 1 million plan in the computer that did not get protection by not commandeer of ground of know the inside story, these computers often are an exorbitant bandwidth (ADSL, cable) visits Internet and always maintain link with the network. Carry code of ” of sleep deeply of embedded in these machines “ , the hacker can establish army group of a dummy quickly, await proper opportunity command to start DDoS to stop to serve attack. If have the affiliation of enough puppet leader, the dimensions of attack is astounding.

The influence that DDoS atttacks

Successful DDos attack influence is very extensive. The expression of network site suffers an effect especially, the person that can cause client and other to use visits failure, impracticability SLAs(serves operation trader horizontal acceptance) , service credit is disastrous, the user is complained increase, company reputation is damaged, it is permanent influence even sometimes. And accrual glides, productivity is reduced, IT expense increases, litigant cost waits these —— losses a moment to be in ceaseless addition.
Previous12 Next

About us | Legal Notices | Sitemap | Links | Partner