A concise question and answer for DDoS attack

Source: Internet
Author: User
Tags set time web services

What is DOS? What is DDoS? What are their hazards? How to prevent them effectively? I think this is a problem that every network manager is concerned about. Below, I discuss Dos attack and defense in detail in the form of question and answer, from the concept of DOS, behavior and prevention means.

Q: What is a denial of service attack?

A:dos is the abbreviation for the denial of service, the denial of services, which causes Dos attacks to be called Dos attacks, which are designed to render the computer or network unable to provide normal services. The most common Dos attacks are computer network bandwidth attacks and connectivity attacks. Bandwidth attack means that the network is hit by a great amount of traffic, so that all available network resources are consumed and the legal user requests cannot be passed. A connectivity attack refers to the use of a large number of connection requests to impact the computer, so that all available operating system resources are exhausted, the end computer can no longer handle legitimate user requests. For example, the week of February 6, 2000, the Yahoo site was the main occurrence of bandwidth attacks.

Q: What is a distributed denial of service attack?

A: Distributed Denial-of-service (ddos:distributed denial of service) attacks multiply the power of denial of service attacks by combining multiple computers as an attack platform to launch a Dos attack on one or more targets with the help of client/server technology. Typically, an attacker uses a theft account to install a DDoS master on a computer, and in a set time the master program communicates with a large number of agents that have been installed on many computers on the Internet. When an agent receives an instruction, it launches an attack. With client/server technology, the master program can activate hundreds of proxy programs in seconds.

How does a q:ddos attack affect a Web site?

When a DDoS attack is performed on a Web site, one or more Web services on the site receive very many requests that ultimately make it unusable. During a DDoS attack, if an unsuspecting user makes a normal page request, the request fails completely, or the page download speed becomes extremely slow, and it appears that the site is unusable. A typical DDoS attack utilizes many computers to send thousands of requests to the target site at the same time. To avoid being traced, attackers would break into some unprotected computers on the internet, hiding DDoS programs on these computers, acting as accomplices and springboard, and finally uniting to launch anonymous attacks.

Q: Is there a quick and easy way to avoid the risk of DDoS attacks?

A: No. But there is a simple basic principle: to prevent the computer from being hijacked by hackers to become the platform of attack, so that the problem is completely eliminated before the attack.

Attackers like to use non-commercial computers as an attack platform because they are more likely to fall. University systems, for example, are often targeted by attackers because they are often understaffed or are set to the lowest level of security for students to use. But this is not a national problem, and any Internet server in the world can be used as a platform for attacks.

So we have to "unite as one" to protect the Internet through global cooperation. At the very least, start with yourself, check your internet computer, and make sure that they don't become DDoS attack platforms. This is not just about being a good internet citizen, but for the evidence that my computer is innocent when a DDoS attack occurs.

Q: Can the government play a big role in defending against Dos attacks?

A: There is no doubt that by imposing a variety of restrictions on the Internet, the government can greatly control the type of Dos attacks, at least those originating from the country. For example, a license that is equivalent to a driver's license can be required on the Internet, a license equivalent to a "business license" is required for the site, and all ISPs are strictly regulated, as are the requirements for many public facilities (such as water, gas, etc.).

Note, however, that restrictions on criminal activity and restrictions on economic growth, education, information resources and general physical freedom are just a few, and governments are difficult to grasp, so many governments are seeking a number of non-intervention methods. Former U.S. President Hillary Clinton, for example, has proposed the development of a computer federation for information security among university graduates to develop the so-called "computer police" to fight against DDoS and other types of computer crime.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.