What is Distributed Denial of Service DDoS Attack?

DDoS (Distributed Denial of Service) is performed using multiple computers to attack the target victim’s computer.

DDoS Definition and Attack

What is DDoS?

Distributed Denial of Service occurs when multiple computers are used to attack a specific target. In our previous article, we have provided detailed information about the Denial of Service (DoS). The DoS attack uses a single computer, while more than one computer uses this type of attack.

Other computers used to attack the victim’s computer are unaware of the attack. In an attack initiated by a hacker, he uses computers on the Internet to make a more powerful blow. These computers on the Internet are exposed to malicious sofInternets a result, if you have an unsecured computer, you help unintentionally and are unaware of the DDoS attack.

How to Do a DDoS Attack?

The attacker can quickly start the attack remotely. A malware-infected computer community is at your fingertips, and when ordered, attacks on the target are initiated.

It can integrate these computers into their network with malicious software that is transmitted to computers connected to the Internet and with a code inserted in Internet software by a Hacker.

Performing a DoS attack is an easy process. You can find many free tools on the Internet. With essential software, the Internet can infect computers with malicious software and infect them with your network.

Therefore, an attack can be made by capturing multiple computers.

The computers that carry out the attack are also called Zombie computers. The group of zombie computers is called Botnet. With Botnet, attacking the target computer is very simple. You don’t necessarily have to be a software engineer. There are even sites that provide Botnet services on the Internet. An attack can also be accomplished by renting a Botnet through these internet DDoS, which is actually a typical DoS attack. The difference between DoS and DDoS is the use of multiple computers.

Operation Logic

The operating logic differs according to the DoS attack type. This type of attack has a Botnet network created by zombie computers. There are thousands of malicious zombie computers in this Botnet network.

In addition, this type of attack operates in a hierarchical structure. Each computer connected to the Internet can be included in a Botnet network—the simplest way to achieve this is to Interneteate a Trojan virus and distribute it on the Internet.

Within a Botnet network, there are handlers and zombies—the Internet handler to gain control over the zombie computers. The instructions given by the attacker are transmitted to the handlers and then transmitted to the zombie computers to execute the given command.

Computers that communicate between the attacker and Zombie computers are called Handler computers. There are Zombie computers under each Handler computer.

Types of Attack

  • Application-Layer DDoS Attack

Application layer attacks are a type of attack that exploits Windows, Apache, OpenBSD, or other software vulnerabilities.

  • Protocol DDoS Attack

Protocol-based attacks are a type of DoS. This type of attack usually involves attacks such as the Ping of Death and the SYN Flood.

  • Volume-Based DDoS Attack

Level-based attacks include ICMP Floods, UDP Floods, and other types of Flood attacks.

Sample Programs

Sample programs that you can easily find on the Internet allow;

  1. HPing
  2. Slowloris
  3. R.U.D.Y
  4. Hiren Patel

Final Word

In this article, we have described the Internet of Distributed Denial of Service. In addition, these attacks can be done not only programmatically but also through websites. Thanks for following us!

The point that should not be forgotten is that these attacks are CYBERCRIME. It is definitely not recommended to do any attacks!

Add a Comment

Your email address will not be published. Required fields are marked *