7 categories of DDoS attacks that Internet companies need to know, no longer confused after reading DDoS protection

DDoS protection may be very unfamiliar to most people, because DDoS attacks are very mysterious to many people, let alone how to protect against such attacks. Let's first give you a detailed understanding of what this mysterious DDoS attack is?
The so-called distributed denial of service (DDoS) attack refers to multiple attackers in different locations simultaneously launching attacks on one or several targets, or one attacker controls multiple machines located in different locations and uses these machines to simultaneously attack the victim. Perform an attack. Since a distributed denial of service (DDoS) attack can cause many computers to be attacked at the same time, the target of the attack cannot be used normally. Therefore, once the attack occurs, it will cause many large websites to become inoperable.
Let's take a simple chestnut to help everyone understand that a group of bullies are trying to prevent the opposite shop (website/server/DNS) from operating normally. What measures will they take? The bullies pretend to be ordinary customers and have been crowded in their rival shops, relying on not leaving, but the real shoppers can’t enter; or they are always chattering with the salesperson, making the staff unable to serve customers normally ; It can also provide false information to the operators of the shops. After the shops are busy up and down, they find that they are all empty, and eventually ran away from the real big customers and suffered heavy losses. In addition, the bullies are sometimes difficult to accomplish these bad things on their own, and need to get many people together. Therefore, when a website is not protected by DDoS protection, users will be inaccessible when it is attacked by DDoS. This is because the server is busy processing thousands of other useless access requests.
Based on different classification standards, distributed denial of service attacks can be classified in different ways. When taking DDoS protection measures, we can choose measures based on different types of DDoS attacks. Generally speaking, this type of attack is roughly divided into seven categories. :
1. Based on the classification of the degree of automation, this classification is mainly divided into manual DDoS attacks, semi-automated DDoS attacks, and automated DDoS attacks.
2. Based on the classification of system and protocol weaknesses, this classification is mainly divided into four types: flood attacks, expansion attacks, attacks using protocols, and malformed packet attacks.
3. Based on the attack rate classification, based on the rate can be divided into continuous rate and variable rate attacks.
4. Classification based on influence. Based on influence, it can be divided into complete breakdown of network services and attacks that reduce network services.
5. Based on the classification of intrusion targets, DDoS attacks can be divided into bandwidth attacks and connectivity attacks based on intrusion targets.
6. Based on the attack route classification, it can be divided into direct attack and repeated attack based on attack route.
7. Based on the classification of attack characteristics, from this perspective, DDoS attacks can be divided into two types: attack behavior characteristics can be extracted and attack behavior characteristics cannot be extracted.
In addition, there are two main manifestations of DDoS attacks: one is a traffic attack that mainly targets network bandwidth. A large number of attack packets are used to block the network bandwidth and cause legitimate network packets to fail to reach the host. The other is a resource exhaustion attack aimed at the server host. A large number of attack packets cause the host's memory to be exhausted or the CPU to be occupied by the kernel and applications, which makes it impossible to provide network services.
If your network or server does not have DDoS protection measures, when it is attacked by DDoS, the network or server will usually show these phenomena: there are a large number of waiting TCP connections on the attacked host. The network is flooded with a lot of useless data packets, the source address is false. There is high-traffic useless data, network congestion is serious, and the host cannot communicate with the outside world normally. Specific service requests are issued repeatedly at high speed, but the victim host cannot process all normal requests in time. In severe cases, the system will crash.
Therefore, doing DDoS protection measures has become very important for today's Internet companies' networks or servers. With DDoS protection measures, you can maximize your own interests from being infringed.
This article is reproduced from: http://www.heikesz.com/ddos1/1801.html

Guess you like

Origin blog.csdn.net/weixin_51110871/article/details/111562590