Site DDoS attack steps and Precautions

Source: Internet
Author: User
Keywords Attacks means precautions steps nbsp;

DDoS attack is a kind of attack method based on traditional Dos attack. A single Dos attack is usually a one-to-one approach, when the target is low CPU speed, memory small or small network bandwidth, etc. performance indicators are not high, its effect is obvious. With the development of computer and http://www.aliyun.com/zixun/aggregation/12311.html > Network technology, the processing ability of the computer is increasing rapidly, the memory is greatly increased, and the gigabit-level network is also appearing. This has increased the difficulty of Dos attacks-the target has strengthened the "digestive power" of malicious attack packs, for example, your attack software can send 3,000 attack packets per second, but my host and network bandwidth can handle 10,000 attack packets per second, so the attack will not have any effect.

At this time distributed Denial-of-service attack means (DDoS) came into being. If you understand the Dos attack, the principle is simple. If the computer and network processing capacity increased 10 times times, with a single attack aircraft can no longer play a role, the attackers use 10 attack aircraft at the same time? With 100 units? DDoS is the use of more puppet machines to attack, to attack the victim on a larger scale than before.

Recently, a famous community in China has been attacked by hackers, the loss of huge, in the current market environment, not only some well-known websites, and some corporate websites frequently suffer from a variety of intentional or unintentional attacks, the author has been self-study for a period of time network security, now the site attack basic principles and basic precautions to tell you, If there is a Master hope to add.

Web site attack steps

1, site attacks generally refers to DDoS attacks (distributed denial of service attacks), first need to find a tool, bricks. Now more popular DDoS tools have many, such as Zombie, the Wind and the wild, and so on, although the version is different, but the effect is not significant.

  

(DDoS attack tool one)

(DDoS attack Tool II)

(DDoS attack Tool III)

(DDoS attack Tool IV)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.