Why is dos and DDoS attacks an Internet disaster?

Source: Internet
Author: User
Tags hosting nslookup website hosting

Why dos and DDoS attacks are the plags of the Internet
Why is dos and DDoS attacks an Internet disaster?

By Jonathan yarden

Author: Jonathan yarden
Translation:Endurer2005.11.08 1st

Keywords: Internet | Security Threats | IDS (Intrusion Detection Systems) | Security Management

Keywords: Internet | Security Threats | IDS (Intrusion Detection System) | Security Management

Http://techrepublic.com.com/5100-1009_11-5933394.html? Tag = NL. e044

Takeaway:
DOS and DDoS attacks are not a new threat-they 've been terrorizing the Internet for years. but after all these years, we re still no closer to learning how to deal with this problem. jonathan yarden weighs in on the threat of DOS and DDoS attacks.

Overview:
DOS and DDoS attacks are not new threats-they have been threatening the internet for some years. However, after these years, we are still not inclined to learn how to solve this problem. Jonathan yarden is the heart of DOS and DDoS attacks.

Endurer note:
1. Close to adv. Close to, near
2. Deal with V. arrangement, handling, involving, and doing business
3. Weigh in V. Participation, called weight, weight before the competition

 
Several years ago, I worked at a small Web site hosting company, where I first encountered the confusion and havoc caused by a Denial-of-Service (DoS) attack. on one occasion, after several hours of being unable to access the Internet, customers no longer cared what the problem was-they just wanted it fixed.
A few years ago, I worked in a small website hosting service company, where I first encountered a Denial of Service (DoS) attack that caused chaos and destruction. One time, after several hours of access to the Internet, customers no longer care about the problem-they only want to fix it.

Endurer note:
1. Havoc N. Great damage, great damage vt. Serious damage
2. On one occasion once, one time

I determined that the traffic was HTTP requests, So I focused on checking Web servers. We hosted a number of popular web sites, and I checked these first.
I decided that the traffic was an HTTP request, so I checked the Web service in a centralized manner. We provide host services for many popular websites. I checked them first.

Endurer note:
1. Focus on set
2. A number of many

The size of one web server log file was considerably larger than any of the others by several orders of magnders. and one solitary IP address was requesting the same URL over and over again. while the Web server itself was operating fine, the traffic was saturating our 1.5-Mbps T1 Internet circuit and cutting off MERs.
The size of the log file on a Web server is several megabytes larger than that on other servers ). A single IP address repeatedly requests the same URL. When the Web server operates on its own, the traffic reaches 1.5-Mbps T1 Internet line, and the customer is cut off.

Endurer note:
1. Order of is about, about
2. Over and over again
3. Fine vt. Fine, refined, clarified adv. <mouth> very good, wonderful, [often used to form compound words] subtle, exquisite
4. Cut off, cut off, and deprive of inheritance rights

To identify where the flood was coming from, I used NSLookup and found the domain name for the IP address causing the problem, which whois resolved to another local hosting company. after several phone callto the competitor's technical support number and a lengthy discussion with several technical staff members, the flood of traffic finally stopped.
To identify where the flood came from, I used NSLookup (endurer Note: NSLookup is used to query various DNS data) and found the Domain Name of the IP address that caused the problem, its whois is resolved to another local host service company. After several technical support phone numbers were pulled from the competitor and discussed with several technical staff members, the traffic flood eventually ended.

I never need ed a clear answer about what happened to knock us offline. but the company folded during the dot-com crash, and a former technical support staff member later told me the attack was intentional-a conclusion I had already come to myself.
I didn't receive an answer about what caused us to go offline. However, the company closed its business when the. com bubble burst. A former technical support staff later told me that the attack was intentional-the conclusion I had come up.

Endurer note:
1. Happen to occurs on... People
2. Come to achieve, inherit, recover, stop; think of

Unfortunately, DoS attacks have evolved into much more than one company trying to cause problems for another. With broadband access almost ubiquitous, there are no longer "simple" DoS attacks.
Unfortunately, DoS attacks have evolved into more than one company trying to cause trouble to other companies. With broadband access, there are almost no "simple" DoS attacks.
Endurer note:
1. [Evolutionary] evolution of evolve
2. More than pH...
3. No longer no longer

As we 've seen, compromised broadband hosts under remote control can knock out even the biggest internet companies, including Google and Microsoft. writers of malicious code know that the majority of broadband computers are poorly maintained, making them ripe targets to install Trojan programs to later use for remote control as a group.
As we have seen, remote control of the lack of resistance to broadband hosts can even make the largest Internet companies, including Google and Microsoft. The authors of malicious code know that a vast majority of broadband network companies lack maintenance, allowing them to wait for mature target trojan programs to be used as a remote control group.

Endurer note:
1. Knock out: Empty, knocked down, broken, broken, and broken

These days, the number-one threat to the Internet as a whole is the targeted distributed DoS (DDoS) attack, which uses vast armies of compromised broadband computers. fighting a DDoS attack is like trying to swim up Niagara Falls.
At present, the top threat to the entire Internet is distributed denial of service (DDoS) attacks, which use a large number of broadband computers that lack resistance. Fighting against DDoS attacks is like trying to swim in the Niagara Falls.

Endurer note:
1. These days now, currently
2. As a whole in general

Most internet companies, even those staffed with the best IT pros, can do little to abate a DDoS flood without a lot of work and balance ance from upstream ISPs. and non-Internet companies generally have no idea when they're under attack-they often don't even know what's going on.
Most internet companies, even those with the best IT experts, can mitigate the DDoS flood without a lot of work and assistance from upstream ISPs. Non-Internet companies are usually unable to cope with attacks-they do not even know what is going on.

The writers of DDoS attacks know this all too well. there are already enabled ented cases of extortion using the threat of DDoS attacks. stopping and recovering from a DDoS attack takes time, money, and a skilled staff.
The author of the DDoS attack knows this. There is a record of extortion using DDoS attack threats. It takes time, money, and manpower to stop and recover DDoS attacks.

DOS and DDoS attacks are not a new threat; they 've been terrorizing the Internet for years. and yet, only a few vendors offer products that can help defend networks from DoS attacks, and even those tools can't withstand a sustained DDoS attack.
DOS and DDoS attacks are not new threats: they have been threatening the internet for some years. However, only some vendors provide products that can help the Internet defend against DoS attacks, and even these tools cannot resist the same DDoS attacks.

Denial of Service is the new plague of the Internet-just ask Google and Microsoft. But after all these years, we're still no closer to learning how to deal with this problem.

DOS and DDoS attacks are new disasters in the Internet-just ask Google and Microsoft. However, after these years, we are still not inclined to learn how to solve this problem.

DDoS attacks are on the rise. And unfortunately, while most organizations won't necessarily be a target for attacks, they'll still be a victim of their effects.

DDoS attacks are on the rise. Unfortunately, although most organizations do not have to be attacked, they will become victims.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.