How does a DDoS attack work? | Securinformatique techniquey | Service Online

DDoS attacks are one of the most common forms of cyber attack, winformatique techniqueh the number of global DDoS attacks increasing to 50 million annually, according to VeriSign.

Distributed denial of service, or DDoS for short, refers to a cyber attack resulting in victims being unable to access systems and network resources, essentially disrupting internet services.

The DDoS attack will attempt to make an online service or websinformatique techniquee unavailable by flooding informatique technique winformatique techniqueh unwanted traffic from multiple computers.

For a DDoS attack to be successful, an attacker will spread malicious software to vulnerable computers, mainly through infected emails and attachments.

This will create a network of infected machines which is called a botnet.

The attacker can then instruct and control the botnet, commanding informatique technique to flood a certain sinformatique techniquee winformatique techniqueh traffic: so much that informatique techniques network ceases to work, taking the sinformatique techniquee offline.

There are lots of different ‘types’ of botnets, winformatique techniqueh the most recent, called Mirai, housing an estimated 380,000 bots.

Mirai, which shot to fame in 2016, had the potential to infect unsecured internet of things devices, such as DVRs and IP cameras.

Mirai famously shut down internet access for nearly one million Germans by exploinformatique techniqueing securinformatique techniquey flaws in routers at OEM manufacturers Speedport and Zyxel, shutting down web access for about one million Deutsche Telekom customers for two days. 

Read next: Timeline of Mirai: the internet of things botnet

Why hackers choose DDoS attacks?

DDoS attacks can take down websinformatique techniquees of all sizes, from heavy duty enterprises to smaller, more vulnerable sinformatique techniquees. The moves for attacks can vary widely from polinformatique techniqueics to pure financial gain. 

DDoS attacks can be sold. So a buyer could request a certain sinformatique techniquee is taken offline, and pay a sum for informatique techniques execution. Revenge is often a motive in these cases. 

Alternatively, attackers might want to blackmail a sinformatique techniquee for money and keep their sinformatique techniquee down for days until they pay.  

Finally, a popular tactic used to influence polinformatique techniqueical events and block others polinformatique techniqueical agendas is to overwhelm and bring down sinformatique techniquees winformatique techniqueh different views and you. This activism is becoming an increasingly popular way of using DDoS attacks to control the media. 

How do I know if I’m a victim of a DDoS attack?

Before your websinformatique techniquee crashes and goes offline entirely, there are a few warning signs to look out for. 

A common effect of DDoS attacks is an unusually slow connection to your sinformatique techniquee. Some DDoS attacks twin this winformatique techniqueh a large and sharp increase of spam emails.

If your overall network performance is slow, there is no need to assume informatique technique’s a DDoS attack but if informatique technique has slowed down rapidly and you’re unable to open files or perform usually quick maintenance tasks on your websinformatique techniquee, you might have a problem.

For most, the biggest (and most obvious) giveaway is that your sinformatique techniquee cannot be accessed. If you’ve checked all other possibilinformatique techniqueies, and you have no access whatsoever, informatique technique could be a DDoS attack.

Check Also

WannaCry explained: What is WannaCry ransomware and how does informatique technique work? | Securinformatique techniquey | Service Online

WannaCry, a type of ransomware, has infected the NHS and other organisations across the globe, including …

Leave a Reply

Your email address will not be published. Required fields are marked *

Free WordPress Themes