What Is a Ddos Attack? And How to Protect It | Total Security Software
Trojans are often used to launch a Distributed Denial of Service (DDoS) attack against target systems, but what is a DDoS attack and how is it performed?
At its most basic level, a distributed denial of service (DDoS) attack confuses the target system with data, so that the response from the target system is either slowed down or stopped altogether. To generate the necessary traffic, a network of zombie or bot machines is often used.
Zombies or computer networks are computers that have been compromised by attackers, generally through the use of Trojans, allowing remote control of these vulnerable systems. Collectively, these systems are being manipulated to create the high traffic flow necessary to create a DDoS attack.
The exchanges between attackers are often sold and traded in these networks, so the compromised system may be under the control of multiple criminals - each with a different target. Some attackers may use robots as a spam relay, others act as a malicious code downloader, others host phishing scams, and others for the DDoS attacks mentioned above.
Several techniques can be used to facilitate a DDoS attack. Two of the most common are HTTP GET and SYN Flood's requests. One of the most famous examples of an HTTP GET attack was from the MyDoom worm, which targeted SCO.com. A GET attack works as its name suggests - it sends a request for a specific page (usually the home page) to the target server. In the case of the MyDoom worm, 64 requests were sent every second from each infected system. With tens of thousands of computers estimated to be infected by MyDoom, the attack quickly proved exasperating at SCO.com, leaving it offline for days.
An SYN Flood is essentially a thwarted handshake. Internet communications use a three-way handshake. The novice client starts with an SYN, the server responds with an SYN-ACK, and then the client assumes the response with an ACK. Using deceptive IP addresses, an attacker sends an SYN sending the SYN-ACK to a non-requesting (and often non-existent) address. The server waits for an ACK response to no avail. When large numbers of these SYN aborted packets are sent to a target, server resources are depleted and the server takes to SYN Flood DDoS.
Several other types of DDoS attacks can be launched, including UDP fragment attacks, ICMP Floods, and Ping of Death. For more details on the types of DDoS attacks, visit the Advanced Network Management Lab (ANML) and review DDoS attack resources.
Many professions have become dependent on computers, in particular, especially youth projects, but some who are proficient in electronic theft may penetrate your accounts, and they can identify your bank accounts and seize your money and even your personal data.
In the following report, Al-Watan reviews the most important advice that business news daily provides to protect your device from hacking.
Install an anti-virus program.
Your laptop or computer can be compromised by malware or viruses. Antivirus programs such as Bitdefender, Protegent360, total security software, Panda Free Antivirus, Malwarebytes, and Avast protect your computer from downloading any malicious or unauthorized software that might threaten the operating system of a device.
Install an anti-spyware package
Information, and works to combat spyware, scan all spyware, and block threats.
Use strong passwords
Using secure passwords is one of the most important ways to prevent penetration of your computer's network, and the more secure your passwords, the harder it is for a hacker to invade your system.
Use a password consisting of at least eight characters and a combination of numbers, upper and lowercase letters, and computer codes, and be aware that hackers have several programs that can crack short and easy passwords in minutes.
Keep operating system, apps, and browser up-to-date
Always install new updates for your operating systems, as these updates include security fixes that prevent hackers from accessing and exploiting your data.
The same goes for apps, and web browsers, be sure to review your browser's security settings as well as install all new updates.
Ignore spam
Beware of emails from unknown destinations, and do not click on links or open the attachments that accompany them.
Back up your computer
If your business isn't already backing up your hard drive, you should start doing it right away.
Always ensure that you can return data as quickly as possible after experiencing any data breach or loss.
Comments
Post a Comment