Why DoS and DDoS attacks are the plague of the Internet
DoS和DDoS攻擊為什麼是Internet的災難
by Jonathan Yarden
作者:Jonathan Yarden
翻譯:endurer 2005.11.08 第1版
Keywords: Internet | Security threats | IDS (Intrusion Detection Systems) | Security management
關鍵字:Internet | 安全威脅 | IDS (入侵偵測系統) | 安全管理
英文來源:http://techrepublic.com.com/5100-1009_11-5933394.html?tag=nl.e044
Takeaway:
DoS and DDoS attacks are not a new threat—they've been terrorizing the Internet for years. But after all these years, we're still no closer to learning how to deal with this problem. Jonathan Yarden weighs in on the threat of DoS and DDoS attacks.
概述:
DoS和DDoS攻擊不是新威脅—它們已經恐嚇Internet有些年頭了。但經過這些年後,我們仍然沒有傾向於學習如何處理這個問題。Jonathan Yarden為DoS和DDoS把脈。
《endurer註:
1。close to adv. 接近於, 在附近
2。deal with v. 安排, 處理, 涉及, 做生意
3。weigh in v. 參加, 稱重量, 比賽前量體重》
Several years ago, I worked at a small Web site hosting company, where I first encountered the confusion and havoc caused by a denial-of-service (DoS) attack. On one occasion, after several hours of being unable to access the Internet, customers no longer cared what the problem was—they just wanted it fixed.
幾年前,我在一家小的網站主機服務公司工作,在那兒我第一次遇到了拒絕服務的攻擊(denial-of-service,DoS)引起的混亂和破壞。有一個時候,在數小時不能訪問Internet後,客戶們不再關心問題是什麼—他們只想著修複。
《endurer註:
1。havoc n. 大破壞, 浩劫 vt. 嚴重破壞
2。on one occasion 曾經, 有一個時候》
I determined that the traffic was HTTP requests, so I focused on checking Web servers. We hosted a number of popular Web sites, and I checked these first.
我斷定流量是HTTP請求,所以我集中檢查Web服務。我們為許多的的受歡迎的網站提供主機服務,我首先檢查了它們。
《endurer註:
1。focus on 集中
2。a number of 許多的》
The size of one Web server log file was considerably larger than any of the others by several orders of magnitude. And one solitary IP address was requesting the same URL over and over again. While the Web server itself was operating fine, the traffic was saturating our 1.5-Mbps T1 Internet circuit and cutting off customers.
一個Web伺服器的log檔案的大小比其它的大出若干兆(magnitude)。一個單獨的IP地址一再地請求同一個URL。當Web伺服器自身操作時,流量達1.5-Mbps T1 Internet線路,並斷絕了客戶。
《endurer註:
1。order of 約為,大約
2。over and over again 一再地
3。fine vt. 罰款, 精鍊, 澄清 adv. <口>很好, 妙, [常用於構成複合詞]細微地,精巧地
4。cut off 切斷, 斷絕, 剝奪繼承權》
To identify where the flood was coming from, I used Nslookup and found the domain name for the IP address causing the problem, which WHOIS resolved to another local hosting company. After several phone calls to the competitor's technical support number and a lengthy discussion with several technical staff members, the flood of traffic finally stopped.
為了明確洪水來自何處,我使用了Nslookup(endurer註:Nslookup用於查詢DNS中的各種資料),發現了造成問題的IP地址的網域名稱,其WHOIS解析到另一家本地主機服務公司。在幾次拔打這個競爭者的支援人員電話號碼,並與幾名技術職員長時討論後,流量洪水最終停止了。
I never received a clear answer about what happened to knock us offline. But the company folded during the dot-com crash, and a former technical support staff member later told me the attack was intentional—a conclusion I had already come to myself.
我沒有收到關於是發生了什麼導致我們離線的答案。但是該公司在.com泡沫破裂時歇業了,一個以前的支援人員職員後來告訴我,攻擊是故意的—我自已已經想到的結論。
《endurer註:
1。happen to 發生在...人身上
2。come to 達到, 繼承, 複蘇, 停止;想起》
Unfortunately, DoS attacks have evolved into much more than one company trying to cause problems for another. With broadband access almost ubiquitous, there are no longer "simple" DoS attacks.
不幸地是,DoS攻擊已經發展進化成不只一個公司試圖給其他公司造成麻煩。隨著寬頻訪問幾乎無處不有,不再存在“簡單的”DoS攻擊了。
《endurer註:
1。evolve into 發展[進化]成
2。more than ph.多於;在...次以上;不只...
3。no longer 不再》
As we've seen, compromised broadband hosts under remote control can knock out even the biggest Internet companies, including Google and Microsoft. Writers of malicious code know that the majority of broadband computers are poorly maintained, making them ripe targets to install Trojan programs to later use for remote control as a group.
如我們所見,遠端控制下缺乏抵抗力的寬頻主機甚至可以使最大的Internet公司,包括google和微軟,筋疲力竭。惡意代碼的作者知道極大多數的寬頻網路公司缺乏維護,使他們對成熟的目標安裝木馬程式留待後用作一個遠端控制組。
《endurer註:
1。knock out 敲空, 擊倒, 打破, 破壞, 使筋疲力竭》
These days, the number-one threat to the Internet as a whole is the targeted distributed DoS (DDoS) attack, which uses vast armies of compromised broadband computers. Fighting a DDoS attack is like trying to swim up Niagara Falls.
目前,整個Internet排在首位的威脅是分散式阻斷服務(distributed DoS,DDoS)攻擊,該攻擊使用大量的大群缺乏抵抗力的寬頻電腦。與DDoS攻擊作戰就像試圖遊上尼亞加拉瀑布。
《endurer註:
1。these days 現在, 目前
2。as a whole 總體上》
Most Internet companies, even those staffed with the best IT pros, can do little to abate a DDoS flood without a lot of work and assistance from upstream ISPs. And non-Internet companies generally have no idea when they're under attack—they often don't even know what's going on.
大多數Internet公司,甚至那些擁有最好的IT專家的,沒有大量工作和上遊ISP的協助,可以對DDoS洪水做些許緩和。非Internet公司在受到攻擊時,通常一籌莫展—他們甚至經常不知是怎麼回事。
The writers of DDoS attacks know this all too well. There are already documented cases of extortion using the threat of DDoS attacks. Stopping and recovering from a DDoS attack takes time, money, and a skilled staff.
DDoS攻擊的作者對此瞭若指掌。已經有利用DDoS攻擊威脅的敲詐的文獻記錄。停止DDoS攻擊並恢複花費了時間,資金和人力。
DoS and DDoS attacks are not a new threat; they've been terrorizing the Internet for years. And yet, only a few vendors offer products that can help defend networks from DoS attacks, and even those tools can't withstand a sustained DDoS attack.
DoS和DDoS攻擊不是新威脅:它們已經恐嚇Internet有些年頭了。然而,只有一些供應商提供能協助網助抵禦DoS攻擊的產品,甚至這些工具不能抵擋相同的DDoS攻擊。
Denial of service is the new plague of the Internet—just ask Google and Microsoft. But after all these years, we're still no closer to learning how to deal with this problem.
DoS和DDoS攻擊是Internet的新災難-就問Google和微軟就夠了。但經過這些年後,我們仍然沒有傾向於學習如何處理這個問題。
DDoS attacks are on the rise. And unfortunately, while most organizations won't necessarily be a target for attacks, they'll still be a victim of their effects.
DDoS攻擊在上升。並且不幸的是,儘管大多數組織機構不必成為攻擊的對象,但將成為犧牲品。