When a malicious user wants to disrupt web services, they often use a distributed denial of service (DDoS) attack. You’ve probably heard the phrase countless times in the media.
The basic idea is always the same: send so much junk to a server that legitimate traffic cannot get through.
DDoS has been used against root domain servers in a bid to shut down the entire world wide web. Despite being as old as the internet itself, DDOS is still one of the most effective tools malicious users have at their disposal.
But what does a DDoS attack actually involve?
We first have to understand both denial of service and distributed denial of service.
What is a DDoS Attack?
The difference between DOS and DDOS is in the origin of the attack.
A denial of service (DOS) attack comes from a single person or network.
A distributed denial of service attack (DDOS) will involve computers from networks all over the world. (Distributing the attack amplifies it, and it also makes it more difficult for the affected party to protect itself.)
The basic idea is always the same: send so much junk to a server that legitimate traffic cannot get through.
DDoS has been used against root domain servers in a bid to shut down the entire world wide web. Despite being as old as the internet itself, DDOS is still one of the most effective tools malicious users have at their disposal.
But what does a DDoS attack actually involve?
We first have to understand both denial of service and distributed denial of service.
What is a DDoS Attack?
The difference between DOS and DDOS is in the origin of the attack.
A denial of service (DOS) attack comes from a single person or network.
A distributed denial of service attack (DDOS) will involve computers from networks all over the world. (Distributing the attack amplifies it, and it also makes it more difficult for the affected party to protect itself.)
Comments
Post a Comment