DDOS attacks have developed from commercial competition to political struggle. Can you still care about DDOS protection?

Now that the importance of DDoS protection in various industries has become more and more obvious, what exactly is a DDoS attack? Simply put, a DDoS attack is a malicious activity designed to bring a computer system to the point where it cannot provide services to legitimate users or perform its intended functions correctly. Errors in the software (software) or excessive load on the network channel or the entire system usually result in a "denial of service" status. As a result, the entire operating system of the software or machine "crashes" or ends in a "loop" state. This leads to the threat of downtime, loss of visitors/customers and loss.
DDoS attacks are divided into local and remote. Local exploits include various exploits, fork bombs, and programs that open one million files each time or start looping algorithms that consume memory and processor resources.
Flood-Send a large number of meaningless (usually less meaningful) packets to the victim's address. Flooding targets can be communication channels or machine resources. In the first case, the packet stream occupies the entire bandwidth and does not enable the attacked computer to process legitimate requests. Second, capture the resources of the machine by making repeated and very frequent calls to any service that performs complex resource-intensive operations. For example, this can be a long call to one of the active components (scripts) of the web server. The server uses all the resources of the computer to process the attacker's request, and the user must wait.
In the traditional version (one attacker-one victim), now only the first type of attack is effective. The classic flood is useless. Just because of the bandwidth of today’s servers, the level of computing power, and the extensive use of various DDoS protection technologies in the software (for example, delays when the same client repeats the same operation), the attacker has become an annoying mosquito. Cause any harm to it. There is no damage. However, if there are hundreds, thousands, and thousands of mosquitoes, they can easily place the server on their shoulder blade. The crowd is a terrifying force not only in life, but also in the computer world. DDoS attacks usually carried out using many botnet hosts can even cut off the most difficult servers from the outside world.
The danger of most DDoS attacks lies in their absolute transparency and "normality." After all, if software errors can always be corrected, complete consumption of resources will almost entirely occur. When computers do not have DDoS protection measures and resources (bandwidth) are insufficient or websites are affected by slashes (twitter.com becomes unavailable within minutes after the first message of Michael Jackson’s death), many administrators will meet On these issues. Moreover, if you continuously reduce everyone's traffic and resources, you will be rescued from DDoS, but you may lose half of your customers, which is not the result of DDoS protection.
Now that DDoS is becoming more and more rampant, DDoS protection measures are very necessary for every company that is connected to the Internet. By doing DDoS protection, a lot of losses can be reduced and the normal operation of the company's business can be protected.
This article is reproduced from: http://www.heikesz.com/ddos1/1856.html

Guess you like

Origin blog.csdn.net/weixin_51110871/article/details/111866383