Deep understanding of DOS denial of service attacks

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

You may have heard of a denial-of-service attack on a Web site, but you may also be the victim of such an attack. Denial of service attacks can be difficult to identify compared to common network activities, but there are still indications that an attack is underway.

What is a denial of service (DoS) attack?

In a denial-of-service attack, an attacker attempts to prevent legitimate users from acquiring information or services. By connecting your computer with its network, or by targeting the computer and network sites you want to use, an attacker could prevent you from accessing e-mail, Web sites, online accounts (bank account numbers, etc.) or other services that depend on the affected computer.

The most common and obvious type of Dos attack occurs when an attacker hits a network with flood-like information. When you type the URL of a Web site in the browser's address bar, you are sending a request to the Web site's computer server to browse the Web page. The server can handle a certain number of requests at the same time, so if an attacker sends a request to the server that exceeds its load, the server cannot process your request. Because you cannot access this site, this is a denial of service attack.

Attackers can use spam messages to launch similar attacks on your email account. Whether your email account is provided by your boss or if you are using a free service account such as Yahoo or Hotmail, you are assigned a specific amount of space that limits how long you can save in your account at any time. By sending a large or large amount of files to your account, an attacker can consume your account space to prevent you from receiving legitimate information.

In a Distributed denial of service (DDoS) attack, an attacker can use your computer to attack another computer. By exploiting security vulnerabilities or vulnerabilities, attackers can control your computer. He or she can force your computer to send a large amount of data to a Web site, or send spam ads to an e-mail address. This attack is "distributed" because the attacker is using multiple computers, including your computer, to launch a denial of service attack.

How do you avoid being part of the problem?

Unfortunately, there are no effective ways to avoid being the victim of a denial-of-service attack or a distributed Denial-of-service attack, but you can take steps to reduce the likelihood that an attacker could exploit your computer to attack another computer.

• Installation and continuous use of anti-virus software

• Install firewalls and configure them to limit the amount of information traffic that your computer receives and sends.

• Publish your e-mail address in accordance with good security practices. Application Email filters can help you manage harmful traffic.

How do you know the attack happened?

Not all service interrupts are caused by denial of service attacks. It may be due to a technical problem with a network, perhaps a system administrator is doing site maintenance. However, the following characteristics may indicate a denial of service attack or a distributed denial of service attack.

• Slow network work (when opening files and entering the site)

• A Web site address is not valid

• No access to any Web site

• A sharp increase in the amount of spam you receive in your account

What do you do if you think you're being attacked?

Even if you correctly determine that a denial-of-service attack or a distributed denial of service attack is occurring, you are unlikely to determine the actual target or source of the attack. You can contact the appropriate professional technician to get help.

• If you find that you are working on a computer that cannot open your own files or go to an external network? Contact your network administrator? This may indicate that your computer or your office network is being attacked?

• If a similar experience occurs on your computer at home, consider contacting your network service provider (ISP). If a problem does exist, the ISP may recommend the appropriate action plan to you.

The following are the referenced contents:

Server leasing and hosting find reciprocity in China

Best service, lowest price, full bandwidth

Special offers in progress: high-profile Send property only 7999

Details Login: www.53dns.com

qq:6984468

025-52829840-8000

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.