CC Attack Principle

Source: Internet
Author: User
Keywords cc attack cc attack type cc attack principle
1. The principle of CC attack:
The principle of CC attack is that the attacker controls some hosts to send a large number of packets to the other server, causing the server resources to run out until the server crashes. CC is mainly used to consume server resources. Everyone has such experience: when a web page has a large number of visitors, it will be slow to open the web page. CC is to simulate multiple users (how many threads are the number of users) constantly accessing those pages that need a lot of data operation (that is, requiring a lot of CPU time), resulting in the waste of server resources and long CPU time At 100%, there will always be endless connections until the network congestion, normal access is suspended.
2. Types of CC attacks:
There are three types of CC attacks: direct attacks, proxy attacks and botnet attacks. Direct attacks are mainly aimed at web applications with important defects. Generally speaking, this kind of attack occurs only when there are problems with program writing, which is relatively rare. Botnet attack is a bit similar to DDoS attack. It can't be prevented from web application level. Therefore, proxy attack is CC. Attackers usually operate a batch of proxy servers, such as 100 agents, and then each agent sends 10 requests at the same time, so that the web server receives 1000 at the same time In this case, the web will immediately disconnect the connection with the agent after the request is made, so as to avoid blocking the bandwidth of the agent by the data returned by the agent, and the request cannot be initiated again The server will queue the processes that respond to these requests, and so will the database server. In this way, the normal requests will be processed very soon. Just like when you go to the canteen, there are usually less than ten people in the queue, but today there are 1000 people in front of you. Then the chance of your turn is very small. At this time, the page opens very slowly Or white screen.
3. The difference between CC attack and DDoS
1) What is DDoS attack?
DDoS attack is a distributed denial of service attack. DDoS attack means is a kind of attack mode based on the traditional DoS attack. A single DoS attack is usually one-to-one. With the development of computer and network technology, DoS attack becomes more difficult. The principle of DDoS attack is very simple: the processing capacity of computer and network has been increased by 10 times, and it can no longer work with one attack machine. Then DDoS is to use more puppet machines to launch attacks and attack the victims on a larger scale than before. The commonly used DDoS software is Loic.
Here we add two points: first, DDoS attacks can attack not only computers, but also routers, because routers are a special type of computer; second, network speed determines whether the attack is good or fast. For example, if you are in a limited network speed environment, their attack effect is not very obvious, but fast network speed is more effective.
2) What is CC attack?
3) The difference between the two
DDoS attacks IP, while CC attacks server resources.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.