DDoS Attacks

Distributed Denial of Service Attack (DDoS) Definition

DDoS stands for “Distributed Denial of Service.” A DDoS attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.

DDoS Hits Per Second

Unlike a Denial of Service (DoS) attack, in which one computer and one internet connection is used to flood targeted resource with packets, a DDoS attack uses many computers and many Internet connections, often distributed globally in what is referred to as a botnet.

"And that concludes our DDoS party: Escapist Magazine, Eve Online, Minecraft, League of Legends + 8 phone requests.”

Tweeted by LulzSec - June 14, 2011, 11:07PM

DDoS attacks can be broadly divided into three types:

Volume Based Attacks

Includes UDP floods, ICMP floods, and other spoofed-packet floods. The attack’s goal is to saturate the bandwidth of the attacked site, and magnitude is measured in bits per second (Bps).

Protocol Attacks

Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources, or those of intermediate communication equipment, such as firewalls and load balancers, and is measured in Packets per second.

Application Layer Attacks

Includes Slowloris, Zero-day DDoS attacks, DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities and more. Comprised of seemingly legitimate and innocent requests, the goal of these attacks is to crash the web server, and the magnitude is measured in Requests per second.

Specific DDoS Attacks Types

Some specific and particularly popular and dangerous types of DDoS attacks include:

UDP Flood

This DDoS attack leverages the User Datagram Protocol (UDP), a sessionless networking protocol. This type of attack floods random ports on a remote host with numerous UDP packets, causing the host to repeatedly check for the application listening at that port, and (when no application is found) reply with an ICMP Destination Unreachable packet. This process saps host resources, and can ultimately lead to inaccessibility.

ICMP (Ping) Flood

Similar in principle to the UDP flood attack, an ICMP flood overwhelms the target resource with ICMP Echo Request (ping) packets, generally sending packets as fast as possible without waiting for replies. This type of attack can consume both outgoing and incoming bandwidth, since the victim’s servers will often attempt to respond with ICMP Echo Reply packets, resulting a significant overall system slowdown.

SYN Flood

A SYN flood DDoS attack exploits a known weakness in the TCP connection sequence (the “three-way handshake”), wherein a SYN request to initiate a TCP connection with a host must be answered by a SYN-ACK response from that host, and then confirmed by an ACK response from the requester. In a SYN flood scenario, the requester sends multiple SYN requests, but either does not respond to the host’s SYN-ACK response, or sends the SYN requests from a spoofed IP address. Either way, the host system continues to wait for acknowledgement for each of the requests, binding resources until no new connections can be made, and ultimately resulting in denial of service.

Ping of Death

A ping of death ("POD") attack involves the attacker sending multiple malformed or malicious pings to a computer. The maximum packet length of an IP packet (including header) is 65,535 bytes. However, the Data Link Layer usually poses limits to the maximum frame size - for example 1500 bytes over an Ethernet network. In this case, a large IP packet is split across multiple IP packets (known as fragments), and the recipient host reassembles the IP fragments into the complete packet. In a Ping of Death scenario, following malicious manipulation of fragment content, the recipient ends up with an IP packet which is larger than 65,535 bytes when reassembled. This can overflow memory buffers allocated for the packet, causing denial of service for legitimate packets.

Slowloris

Slowloris is a highly-targeted attack, enabling one web server to take down another server, without affecting other services or ports on the target network. Slowloris does this by holding as many connections to the target web server open for as long as possible. It accomplishes this by creating connections to the target server, but sending only a partial request. Slowloris constantly sends more HTTP headers, but never completes a request. The targeted server keeps each of these false connections open. This eventually overflows the maximum concurrent connection pool, and leads to denial of additional connections from legitimate clients.

NTP Amplification

In NTP Amplification attacks the perpetrator exploits publically-accessible Network Time Protocol (NTP) servers to overwhelm the targeted server with User Datagram Protocol (UDP) traffic. In an NTP amplification attack, the query-to-response ratio is anywhere between 1:20 and 1:200 or more. This means that any attacker that obtains a list of open NTP servers (e.g., by using tool like Metasploit or data from the Open NTP Project) can easily generate a devastating high-bandwidth, high-volume DDoS attack.

HTTP Flood

In HTTP flood DDoS attack the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application. HTTP floods do not use malformed packets, spoofing or reflection techniques, and require less bandwidth than other attacks to bring down the targeted site or server. The attack is most effective when it forces the server or application to allocate the maximum resources possible in response to each single request.

Zero-day DDoS Attacks

“Zero-day” are simply unknown or new attacks, exploiting vulnerabilities for which no patch has yet been released. The term is well-known amongst the members of the hacker community, where the practice of trading Zero-day vulnerabilities has become a popular activity.

HTTP flood - 690,000,000 DDOS requests from 180,000 botnets IPs Incapsula mitigates a massive HTTP flood: 690,000,000 DDoS requests from 180,000 botnets IPs.

Sources of DDoS Attacks

DDoS attacks are quickly becoming the most prevalent types of attacks, growing rapidly in the past year in both number and volume, according to recent market research. The trend is towards shorter attack duration, but bigger packet-per-second attack volume, and the overall number of attacks reported has grown markedly, as well.

During the Q4-2011, one survey found 45% more DDoS attacks compared to the parallel period of 2010, and over double the number of attacks observed during Q3-2011. The average attack bandwidth observed during this period was 5.2G bps, which is 148% higher than the previous quarter.

Another survey of DDoS attacks found that more than 40% of respondents experienced attacks that exceeded 1Gbps in bandwidth in 2013, and 13% were targeted by at least one attack that exceeded 10G bps.

From a motivational perspective, recent research found that ideologically motivated DDoS attacks are on the rise. The research also mentioned financial reasons (e.g., competitive feuds) as another common reason for such attacks.

entry-level DDoS attack tool (Low Orbit Iron Cannon) LOIC (Low Orbit Ion Cannon): an "entry-level" DoS attack tool

Incapsula Solutions Mitigate DDoS Damage

Incapsula seamlessly and comprehensively protects web sites against all three types of DDoS attacks, addressing each with a unique toolset and defense strategy:

Volume Based Attacks

Incapsula counters these attacks by absorbing them with a global network of scrubbing centres that scale, on demand, to counter multi-gigabyte DDoS attacks.

Protocol Attacks

Incapsula mitigates this type of attack by blocking "bad" traffic before it even reaches the site, leveraging visitor identification technology that differentiates between legitimate website visitors (humans, search engines etc.) and automated or malicious clients.

Application Layer Attacks

Incapsula mitigates Application Layer attacks by monitoring visitor behavior, blocking known bad bots, and challenging suspicious or unrecognized entities with JS test, Cookie challenge, and even CAPTCHAs.

Incapsula DDoS protection, DDoS attack mitigated Incapsula mitigates 100GBps DDoS attack. One of Internet's largest.

In all these scenarios, Incapsula applies its DDoS protection solutions outside of your network, meaning that only filtered traffic reaches your hosts. Moreover, Incapsula maintains an extensive DDoS threat knowledge base, which includes new and emerging attack methods. This constantly-updated information is aggregated across our entire network - identifying new threats as they emerge, detecting known malicious users, and applying remedies in real-time across all Incapsula-protected websites.

### 如何防护网站免受DDoS攻击 #### 选择合适的DDoS防护服务 为了有效地应对DDoS攻击,可以选择专业的DDoS防护服务。这些服务通常提供多种防护机制和技术手段来减轻或阻止攻击流量。例如,DDoS原生专业版能够通过配置阶梯调度策略,自动调度高防IP资源进行防护,从而抵御大规模的攻击流量[^1]。 #### 实施多层防御策略 构建多层次的安全体系对于防止DDoS攻击至关重要。这包括但不限于在网络边界部署防火墙、入侵检测系统(IDS)/入侵预防系统(IPS),以及应用级负载均衡器等设备。此外,还应考虑采用内容分发网络(CDN)服务商提供的抗D服务,它们可以在靠近用户的边缘节点上过滤恶意请求并缓存静态资源,减少源站服务器的压力[^2]。 #### 加强基础设施建设 增强数据中心内部硬件设施也是防范DDoS的重要环节之一。确保有足够的带宽冗余以吸收突发的大规模访问量;优化路由器和交换机性能参数设置,提高数据包处理效率;定期更新操作系统补丁程序及应用程序版本,修补已知安全漏洞,降低被利用的风险。 #### 教育员工与制定应急预案 除了技术和物理层面外,人的因素同样不容忽视。企业应当加强信息安全意识培训工作,使每位成员都清楚认识到潜在威胁的存在及其危害程度,并掌握基本应急响应流程。同时建立完善的事件管理计划,在遭受严重攻击时能迅速做出反应,最大限度地减小损失范围[^3]。 ```python def ddos_protection_strategy(): """ A function to outline the strategies for protecting a website from DDoS attacks. Returns: str: Summary of protection measures against DDoS attacks. """ return "Choose professional DDoS protection services, implement multi-layered defense mechanisms," \ "strengthen infrastructure construction and educate staff while preparing emergency plans." print(ddos_protection_strategy()) ```
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值