Welcome Guest.

2Answers

Can ddos ​​attacks be fundamentally solved?

Asked by: Cynthia 203 views Internet May 27, 2019

Can ddos ​​attacks be fundamentally solved?

2 Answers

  1. +4Votes  

    DoS has a variety of attack methods. The most basic DoS attack is to use a reasonable service request to occupy too many service resources, so that legitimate users can not get the response of the service. The DDoS attack method is a type of attack generated on the basis of the traditional DoS attack. A single DoS attack is generally one-to-one. When the target CPU speed is low, the memory is small, or the network bandwidth is small, the performance indicators are not high. With the development of computer and network technology, the processing power of computers has increased rapidly, the memory has increased greatly, and the network of gigabits has also appeared. This has made the difficulty of DoS attacks more difficult – the goal is to digest the malicious attack packets. Ability " has been enhanced. For example, your attack software can send 3,000 attack packets per second, but my host and network bandwidth can process 10,000 attack packets per second, so the attack will not produce any effect. . At this time, distributed denial of service (DDoS) attacks came into being. If you understand the DoS attack, its principle is very simple. If the processing power of the computer and the network is increased by 10 times, if an attacker can no longer function, the attacker uses 10 attackers to attack at the same time. Use 100 sets? DDoS is using more downtime to launch an attack, attacking the victim on a larger scale than before.
    Hazard:
    The phenomenon of being attacked by DDoS; there are a large number of waiting TCP connections on the attacked host; the network is full of useless data packets, the source address is false; manufacturing high-traffic useless data, causing the network Congestion, the victim host can not communicate with the outside world normally;
    Using the service provided by the victim host or the defect on the transmission protocol, repeatedly issuing a specific service request at high speed, so that the victim host cannot process all normal requests in time; System crashes;

    saber- May 27, 2019 |

  2. +7Votes  

    Add a hardware firewall

    saber- May 27, 2019 |