[Infographic] What Is DDoS Attacks And How Does It Works ?

[Infographic] What Is DDoS Attacks And How Does It Works ?

KrebsOnSecurity hit with 665 Gbps DDoS attack — biggest assault the Internet has ever witnessed
[Infographic] Enemies of Internet Freedom – Government Organizations Around the World who Monitor our Online Activities
Top 23 Best Android Hacking Apps And Tools Of 2016

The internet has grown exponentially in use and not all of its controls have grown proportionally with it. The fact that DDoS Attacks stands for Distributed Denial of Service and is today’s most common Web-based attack method, the primary weapon of hacktivists and APT (advance persistent threat) groups looking to disguise their real intentions under a cloud of HTTP requests.

DDoS attacks is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information. Recently New York Magazine site alleged to DDoS attack, which became inaccessible for over 12 hours.

Also Read : [Infographic] What Is Programming And What Do Programmers Do?

Types of DDoS Attacks

DDoS attacks come in many different forms, from Smurfs to Teardrops, to Pings of Death. Below are details about the types of DDoS attacks :

  • TCP Connection Attacks – These attempt to use up all the available connections to infrastructure devices such as load-balancers, firewalls and application servers. Even devices capable of maintaining state on millions of connections can be taken down by these attacks.
  • Volumetric Attacks – These attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.
  • Fragmentation Attacks – These send a flood of TCP or UDP fragments to a victim, overwhelming the victim’s ability to re-assemble the streams and severely reducing performance.
  • Application Attacks – These attempt to overwhelm a specific aspect of an application or service and can be effective even with very few attacking machines generating a low traffic rate (making them difficult to detect and mitigate).

Also Read : Top 10 Programming Language That Will Help You to Get Dream Job

We already explained two types of cyber attacks, SQL Injections and XSS attacks in our previous articles. In this article, with the help of infographic created by Barricade will explain you what is DDoS attacks and how does it works.

DDoS Attacks

Also Read : Top 10 Cloud Programming Languages

COMMENTS

WORDPRESS: 0