Principles of CC attack and DDOS attack

Today we will talk about cc attack and its principle. Cc attacks are mainly used to attack pages. I believe you have had this experience. If the number of people visiting the forum is relatively large, the page opening speed is relatively slow, because the more forum pages, the larger the database, and the more frequently accessed. High, the greater the system resources occupied, and the cc attack is to make full use of this, simulating multiple users to access non-stop, during the access process, you must first read the content of the post, read your permissions, and finally display I visited the database at least three times when I came out. It's like when we are eating, we need to order first, then eat, and finally pay. Assuming that the size of the database is only 200mb, the system is likely to search this 200mb database. How much CPU resources and time does this require? If I search for a keyword, the search will definitely be judged once by all the data, which consumes a lot of time. Insert picture description here
Similarly, there is a DDOS attack, distributed denial of service, which is often used by hackers and is difficult to prevent. The difference is that CC is mainly for web pages. The DDOS is mainly aimed at ip attacks. The so-called distributed denial of service. It means that the attacker controls multiple machines in different locations and uses these machines to carry out attacks on the victim at the same time. By sending a large number of data packets to the target server, exhausting its bandwidth, and finally causing the target server to be paralyzed, resulting in the ultimate failure use. Suppose your attack software can send 3000 attack packets per second, but my host and network broadband can process 10,000 attack packets per second, so that the attack will not produce any effect. At this time, distributed rejection Service attacks came into being. If the processing power of the computer and the network has been increased tenfold, and an attack with one attack plane can no longer work, what about the attacker using ten attack planes to attack? How about 100 units? DDoS is to use more puppet machines to launch attacks and attack victims on a larger scale than before. The phenomenon of being attacked by DDoS, there are a large number of waiting TCP connections on the attacked host, and the network is full of a large number of useless data packets. The source address is false, creating high-traffic useless data to cause network congestion, making the victim host unable to communicate with the outside world normally, using the services provided by the victim host or defects in the transmission protocol to repeatedly issue specific service requests at high speed, making the victim host unable to timely Handle all normal requests, and cause system crash in severe cases.Insert picture description here
To give a simple example, I opened a restaurant, and the business is very busy. However, the restaurant opposite Wang Er’s house was not interested, so Wang Er thought of a way to target me. He called 50 people to my store, sitting but not ordering, so that other guests could not eat. This is a typical Didi DDOS attack. So what other common cyber attacks do you know? Tell me how to solve it.
Hurricane Technology-vx IDC001

Guess you like

Origin blog.csdn.net/weixin_45841668/article/details/107809026