Viewing the importance of DDOS protection from the development process of DDOS attacks

With the development of network technology and network applications, DDOS protection has become more and more important and has been raised to a very high level. With the rapid development of the Internet, DDOS attacks have become increasingly rampant. From the original several megabytes and tens of megabytes to the current traffic attacks of tens of G and tens of terabytes, a large chain of interests has been formed. DDOS attacks have become one of the most difficult network security problems because they are easy to implement, difficult to prevent, and difficult to track, and they have brought great harm to the network society. At the same time, denial of service attacks will also be one of the important means of information warfare in the future.
The DDoS attack method is a type of attack method based on the traditional DoS attack. A single DoS attack generally uses a one-to-one approach. When the target's CPU speed is low, memory is small, or network bandwidth is low, its effect is obvious. With the development of computer and network technology, the processing power of computers has grown rapidly, and the memory has greatly increased. At the same time, gigabit, 10 gigabit, and hundred-level networks have appeared, which makes DoS attacks more difficult-the target is malicious The "digestibility" of attack packets has been strengthened a lot. For example, your attack software can send 3,000 attack packets per second, but my host and network bandwidth can process 10,000 attack packets per second, so the attack will not What effect will it have.
At this time, distributed denial of service attacks (DDoS) came into being. If you understand a DoS attack, its principle is very simple. If the processing power of the computer and the network has been increased by 10 times, and using one attack machine to attack can no longer work, what about the attacker using 10 attack machines at the same time? How about 100 units? DDoS is the use of more puppet machines to launch attacks and attack victims on a larger scale than before. And if there is no corresponding DDOS protection, it will cause heavy losses.
Distributed Denial of Service (DDoS: Distributed Denial of Service) attack refers to the use of client/server technology to combine multiple computers as an attack platform to launch DoS attacks against one or more targets, thereby exponentially increasing the denial of service attack power. Usually, an attacker uses a stolen account to install the DDoS master program on a computer. The master program will communicate with a large number of agents at a set time. The agent programs have been installed on many computers on the Internet. The agent launches an attack when it receives an instruction. Using client/server technology, the main control program can activate hundreds of agent operations within a few seconds. The
high-speed and wide-connected network brings convenience to everyone and creates extremely favorable conditions for DDoS attacks. In the era of low-speed networks, when hackers occupy the puppet machine used for attack, they will always give priority to the machine that is close to the target network, because the number of hops through the router is small and the effect is good. Now, the connections between the backbone nodes of telecommunications are all at the G level, and the connection between big cities can reach 2.5G, which allows attacks to be launched from farther places or other cities, and the location of the attacker’s puppet machine can be In a larger range, the choice is more flexible. But it has also led to the increasing importance of DDOS protection.
The following phenomena may occur when being attacked without DDOS protection:
• There are a large number of waiting TCP connections on the attacked host.
• The network is flooded with a lot of useless data packets, and the source address is false.
• Create high-traffic useless data, causing network congestion, making the victim host unable to communicate with the outside world normally.
• Use the service provided by the victim host or the flaws in the transmission protocol to repeatedly issue specific service requests at a high speed, so that the victim host cannot process all normal requests in a timely manner.
• In severe cases, the system will crash.
In the face of increasingly terrifying DDoS attacks, we don’t have to panic. As long as we do the corresponding DDoS protection measures, we can maximize the security of our servers or networks and safeguard our own legitimate interests.
This article is transferred from: https://www.zhuanqq.com/News/Industry/353.html

Guess you like

Origin blog.csdn.net/weixin_51110871/article/details/113656707