Skip to main content

DDoS Attack Explained

hello everyone in this Article we're going to talk about DDoS and what it is dee da stands for distributed denial of service and what this is it's basically a cyber attack on a specific server or network with the intended purpose of disrupting that network or servers normal operation and a DDoS attack does this by flooding the targeted network or server with a constant flood of traffic such as fraudulent requests which overwhelms the system causing a disruption or denial of service to legitimate traffic so for example here we have a web server and let's just say that this web server could be loan to a company that sells their products over the Internet and over here we have a couple of customers with their computers that are browsing the company's web site looking at the company's products or services now let's just say that someone just wanted to do an attack on this company's web server and let's just say that they're going to attack the server for whatever reason for example maybe they don't like the company or they don't like the owners of the company or whatever so what happens is the attacker is going to use their computer and their program to attack this server and flood it with fraudulent data traffic to try and disrupt its service now this is not a DDoS attack this is just called a DOS attack which stands for denial of service because a DOS attack is an attack that's just coming from one source now normally a network or server is able to handle an attack from a single source because it's easier to pinpoint the server can just simply close the connection where the attack is coming from so that's not really a problem however the problem is that what if an attack comes from multiple sources simultaneously and that is what a DDoS is a DDoS is an attack from multiple sources all at once so this can ughter here who is the ringleader can communicate with other computers around the world and coordinate an attack on this server so now instead of an attack coming from a single source the server now has to deal with an attack from multiple sources and when this happens it will overwhelm the server it will eat up the server's system resources such as the CPU and memory and it will also eat up network bandwidth so as a result these legitimate computers over here are going to be denied service because the server is too preoccupied in dealing with a DDoS attack so the webpage is that these computers want to access or either not going to load or they are going to be very slow in loading and they'll get that familiar spinning wheel of lag on their screens so the question is how does the attacker get other computers to get involved in a DDoS attack and the simple answer is by using malicious software the attacker will developed a malware program and distribute it over the internet and put it on things like websites and email attachments so if a vulnerable computer goes to these infected websites or opens these infected email attachments the malware will be installed on their computer without the owner even knowing that their computer has been infected so now their computer has been recruited in an army of other infected computers to perform a DDoS attack and this army of infected computers is what's called a botnet now this botnet is not just limited to a few computers this botnet could be hundreds or even thousands of computers that are scattered all over the world so now this botnet can be controlled like an army waiting to receive instructions from the attacker who is now like a centralized command and control center for the botnet and then the attacker can send out commands to all these computers and to tell them to attack at a certain date and time and then once that set time is reached the attack begins now a DDoS attack can last for hours or even days it just depends on the attackers intent so another question is why do people do DDoS attacks DDoS attacks can happen for several different reasons for example it could be for financial reasons and the attacker is ddossing a competitor in the marketplace it could also be for maybe political reasons maybe they don't like the targeted organizations beliefs or it could also be that maybe the attacker is just doing it for fun

Comments

Popular posts from this blog

Printers Explained - Laser, Inkjet, Thermal, & Dot Matrix

hello everyone in this article we're going to talk about different types of printers now printers allow the ability to print copies of documents or photos onto paper from a computer now there are several different types of printers but the most common types that are used in homes and businesses are inkjet and laser printers and there are also a couple of less common printers such as thermal printers and dot matrix printers which we'll talk about later so let's first talk about inkjet printers now inkjet printers are the most common printers that are used in homes they are affordable and they produce photo quality results and they are enough to suit the needs of a typical home user now an inkjet printer works by the printhead moving back and forth across the paper during printing and during this process the printhead places ink on the paper in very tiny dots in fact these dots are so tiny that they are smaller in diameter than a human hair and as these dots are precisely pla

VLAN Explained

VLAN stands for virtual local area network a VLAN is a local area network where the computers servers and other network devices are logically connected regardless of their physical location so even if these devices are scattered in different places it wouldn't matter because a VLAN can logically group them into separate virtual networks and the purpose of a VLAN is for improved security traffic management and to make a network simpler so as an example let's say you have a three-story office building and in this building you have computers that belong to certain departments that are mixed in with computers that belong to other departments on the same floor so the red computers represents the accounting department the blue computers represent the shipping department and the green computers represent the support department now as you can see all these computers from these different departments are all connected to a switch so they are all on one segment on a local area network or

Port Forwarding Explained

what is port forwarding now maybe you've heard about it but you weren't exactly sure what it was or how it works so basically port forwarding allows computers over the Internet to connect to a specific computer or service within a private network it's basically making your computer accessible over the Internet even though you're behind a router so for example let's say a friend of yours at their home wants to remotely control your computer at your home using a service such as remote desktop connection now remote desktop connection is a service built into Microsoft Windows that enables you to connect to another computer running Microsoft Windows and then once you're connected to the remote computer you can use that computers programs and files just as if you were sitting in front of it so now your friend is ready to connect to your computer so we starts up the remote desktop connection and sends the request to your public IP address with a specific port number no