Selasa, 24 Mei 2016

Explanation of DOS and DDOS attack

Explanation of DOS and DDOS attack

    Attacks DoS (denial-of-service attacks') is a type of attack on a computer or server in the Internet network by spending resources (resource) owned by that computer until the computer is not able to function properly thus indirectly prevent users others to gain access to the services of the computer that was attacked.
     In a Denial of Service attacks, the attacker will try to prevent a user access to a system or network using several different ways, including the following:

  • Flooding the network traffic with a lot of data so that network traffic is coming from unregistered users will be unable to enter into the network system. This technique is referred to as traffic flooding.
  • Flooding the network with a lot of requests to a network service disedakan by a host so that requests are coming from a registered user can not be served by such services. This technique is referred to as a request flooding.
  • Interfere with communication between a host and a client that is registered by using a lot of different ways, including by changing the system configuration information, or even the physical destruction of the components and servers.

 DDos Attack Denial of Service in Distributed (Distributed Denial of Service (DDos)) is one type of denial of service attacks that use multiple host attacker (either using a dedicated computer to attack or computer "forced" into a zombie) to attack one fruit in a target host jaringan.Atau an attempt to make a computer resource can be used by its user, using thousands of zombie systems 'attack' simultaneously. The goal is negative, namely that a website or online service can not work efficiently or even dead at all, temporarily or permanently. DDoS attack is one of the models of DoS (denial-of-service) attacks.

 HISTORY DOS ATTACK

Forms of Denial of Service attacks are attacks initial SYN Flooding Attack, which first appeared in 1996 and exploit the weaknesses contained in the protocol Transmission Control Protocol (TCP). Other attacks finally developed to exploit the flaw contained in dalamsistem operations, network services or applications to make that system, network service, or application can not serve the user, or even crash. Some of the tools used to perform DoS attacks was developed after it (even some freely available tools), including Bonk, LAND, Smurf, Snork, WinNuke, and Teardrop.
Nevertheless, attacks against the TCP DoS attacks are often performed. This is because the other type of attack (as well as filled the hard disk in the system, locking one valid user account, or modify the routing table in a router) requires network penetration in advance, the possibility of penetration is small, especially if the network system has been strengthened.
 
Differences Dos and DDos attack atta

The difference between a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack is the DoS attack, a computer and an internet connection is used to flood the server with the package, with the aim of overloading the targeted server bandwidth and resources.
A DDoS attack, using multiple devices and multiple internet connections, often distributed globally into what is called a botnet. A DDoS attack is, therefore, much more difficult to deflect, simply because there is no single attacker to maintain than, as resources are targeted to be inundated with requests from hundreds and thousands of different sources.

Tidak ada komentar:

Posting Komentar