'Denial of Service' Attack: Web site obsession

'Denial of Service' Attack: Web site obsession Picture 1 "Dear newspaper: at 7pm today, we will launch an attack on your online newspaper website in the form of DoS (denial of service attack), for the purpose of . checking Please check the defenses of the newspaper. Please note: the data will not be lost but the site will be forced to stop working during the time of our attack! ".

 

Two weeks ago, the threat was sent to Thanh Nien Newspaper, the author called himself "Central hacker group".By 'G' that evening, Thanh Nien Newspaper website still works normally.Maybe "Central hacker group" suddenly changed the plan at the end of the hour or that threat was just a joke of the idle.Even though the attack did not happen, the type of hack to deny service as "threatening" is always the obsession of websites.

 

Although a DoS attacker cannot gain access to the system or can change, if a system cannot provide information or services to users, that existence is meaningless. !There have been many famous DoS attacks on the world's leading commercial sites such as Yahoo, Amazone, eBay or even Microsoft a few years ago causing millions of dollars in damage.Recently, many domestic websites, including some online newspapers, have become victims of this form of attack.Consequently, users can not access the website, significantly affecting the operation of the website.

 

DoS denial of service (Denial of Service) is the common name for an attack that causes a certain system to be overloaded and unable to provide services, or to be deactivated.For good security systems, it is difficult to penetrate, denial of service attacks are used by hackers as a finish to destroy the system.Depending on the implementation method, DoS is known under different names: the most classic is the DoS (Denial of Service) attack by taking advantage of the weakness of TCP (Transmision Control Protocol);The latter is DDoS (Distributed Denial of Service) - distributed denial of service attack;The latest is a denial of service attack using the DRDoS reflection method (DistributedReflection Denial of Service).

 

In order to perform "DDoS Distributed Service Denial Attack", the attacker seeks to take over and control multiple computers or intermediate computer networks (acting as zombies) from many places to simultaneously send the massively Packet (packet) in very large quantities, the purpose of appropriating resources and flooding the path of a certain target.Particularly, "Reflexive denial of service DRDoS" only appeared recently but is the most dangerous type.If done by professional hackers, no system can stand up to it.More significantly, there have been many viruses, worms, and trojans that automatically perform DoS attacks.

 

There are also other variants: Broadcast Storms, SYN, Finger, Ping, Flooding . with the aim of appropriating system resources such as Bandwidth, Kernel Table, Swap Space, Cache, Hardisk, RAM, CPU . causes the system operation to be overloaded, thus failing to meet valid requests.In particular, the current variant "fashion" is the Flood form - "flooding".The attacker uses flash scripts (scripts), which are attached to web pages with a large number of visitors.Each member accessing these forums will accidentally activate the flash file to perform DoS attacks on specific targets.Many domestic attackers now also write software capable of automating the process of flooding input forms, automatically sending requests (requests) continuously to the server causing the system to be overloaded.

 

Denial-of-service attacks are often very difficult to prevent due to the unexpectedness and often having to defend in the passive "battle" that took place.System administrators should regularly update the latest software patches, antivirus programs, trojans and worms for the system.Turn off all unnecessary services on the system and close all service ports that do not need to use.Setting up a backup server at another address to circulate as soon as an incident occurs, the system will not be interrupted.Use a router / firewall to restrict, remove invalid packets, reduce the amount of traffic on the network and the system load.For websites that use input forms, it is recommended to install the "security code" feature;limit IP registration at the same time . to limit data flooding.In addition, information is required for Internet service providers (ISPs) to immediately block invalid data packets remotely.In particular, playing the most important role is still the administrators with the need to closely monitor and supervise the system to promptly analyze and find causes to deal with when incidents occur and do not forget often update new knowledge .

 

To Tam - Thanh Nghi 

5 ★ | 1 Vote

May be interested

  • Internet's 'Father' and the interplanetary protocolPhoto of Internet's 'Father' and the interplanetary protocol
    32 years ago, two computer scientists vinton g. ceft and robert e.kahn sat together at a hotel in palo alto, california, usa, and outlined code to strengthen the network. internet.
  • Your computer: Polish PCPhoto of Your computer: Polish PC
    do you feel your pc is becoming an 'antique'? here are ways to get your pc up and running faster, store more and more ... for entertainment!
  • Operating system: Replace Windows?Photo of Operating system: Replace Windows?
    will windows users find happiness in another environment? windows causes us a lot of trouble, its security issues are just enough of a headache. this makes the user 'on
  • 'Life up' for laptopsPhoto of 'Life up' for laptops
    the technology is getting faster and faster, your laptop soon becomes an 'antique', runs slowly, many utilities follow hardware. pc upgrade is also easy, but a laptop is 'one-piece' and how to replace it? but still c
  • Take care of the laptop screenPhoto of Take care of the laptop screen
    lcd technology allows the laptop to have a slim, compact design, low power consumption, sharp images ... using the laptop screen in principle will help extend the life and avoid losing money unfairly due to the
  • Bluetooth headset, convenient or just for ... jewelry?Photo of Bluetooth headset, convenient or just for ... jewelry?
    in the past 1 year, high-tech young people and hi-tech fashion often appear on the street with a 'teng' earpiece on one ear, like a communication device in fake films. idea or action style &