• Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Menu
  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Dashboard
Popular Search fivem

Getting Started

  • What is Lectron?
  • FAQ
  • Locations
  • Features
  • Billings
  • Getting started
  • How to use the Dashboard
  • Why is this called Armor?
  • How to Configure SRV Record Correctly
  • How to report high ping issues to Lectron?

Beginner's Guide

  • What is the internet?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works
  • TCP vs. UDP Comparison
  • What is a server?
  • What is a DDoS attack?
  • What is a Firewall?
  • Protected: What is a port?
  • How to Configure SRV Record Correctly
  • Proxy Protocol
  • What is TCP Protocol?
  • What is UDP Protocol ?

Troubleshooting

  • High Latency and General Lag
  • Edge TLS
  • Ping and TraceRoute (tracert) commands
  • Understanding Network Address Translation (NAT)
  • What are SSL, TLS, HTTP and HTTPS?
  • Understanding IPv4 and IPv6
  • Understanding FTP (File Transfer Protocol)
  • What is Wireshark
  • Diagnosing Network Issues with MTR

Attack Types

  • SYN Flood
  • TCP Half-Open
  • DNS Reflection Attack
  • Denial of Service explained
  • DDoS through DNS Requests
  • UDP Flood
  • Vulnerability Attack
  • Phishing Attacks
  • Common Security Threats
  • Ping of Death ICMP Attack
  • Slowloris Attack

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Firewall

  • what is Firewall?
  • Home
  • Documentation
  • Protect
  • DDoS Attack
  • Characteristics of DDoS attack

Characteristics of DDoS attack

Unlike other forms of denial of service (DDoS) attacks, DDoS often does not take advantage of the system’s security holes, but mainly relies on the “size” of traffic to “block the circuit”. for the server. This makes DDoS attacks somewhat easier to execute than DoS because there is no need to rely on new security vulnerabilities. In contrast, how to increase and focus traffic on the target is the challenge of DDoS attacks.

Due to limitations in hardware, operating systems, and especially transmission lines, it is often impractical to centralize traffic from certain individuals. On the other hand, centralizing traffic from certain sources makes prevention easier. For the above reasons, DDoS attacks often involve a large number of sources, and this is a characteristic of DDoS. One of the easiest ways to focus traffic is to “call” people. Through websites, chat… a large number of users are called to visit the target website at a certain time. The user can then use the F5 key to revisit the site to generate more traffic. This type of attack is also commonly known as an “F5 attack”. But calling people and operating this type of attack is arduous and ineffective, so it is almost no longer used. An example of this type of attack is the attack on one of the popular websites in Japan, “2ch” in 2010 from South Korea. Another variation of this type of attack is the use of tools to raise the access level from a machine much higher than using F5 movies continuously. One of the popular tools is LOIC, HOIC

Another form of DDoS attack is through botnets. Taking advantage of the loopholes of the operating system, software… a large number of botnets have been formed and are used for many different purposes. As discussed in part 1, the rapid proliferation of IoT devices has also led to the formation of more botnets. Over 100,000 Mirai bots have been reported to have participated in the 2016 Dyn attack. Using botnets makes it easier to centralize traffic from sources around the world. With just a simple command, all bots can access a certain target and create a DDoS attack.

More recently, with the discovery of security vulnerabilities, cyber-attacks that take advantage of amplification have become more common. There are many types of this type of attack, the prominent ones are NTP (core level more than 500), DNS (core level more than 50). Taking advantage of this multiplier, a 1Gbs traffic can easily become 500Gbit/s, a size that can bring down almost any website or can cripple small and medium service providers.

A half characteristic of DDoS attacks is that source IP addresses are often spoofed and the preferred protocol is UDP (or ICMP) rather than TCP. Spoofing the source address makes attacks harder to detect. And the use of connectionless protocols makes it easier to fake the source address.

Nowadays, cyber attacks are becoming more and more complex. The characteristics of DDoS attacks change frequently. Even during an attack, the attacks often change the source address, protocol, packet size, etc., in order to bypass preventive measures.

Reactions
Share this Doc:
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on July 31, 2021
Overview of DDoS attack.Protective Measures

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

join our newsletter

Get frequent news, updates and rewards !





We make the metaverse a better place.
Facebook-f Twitter Instagram Linkedin-in Youtube Github Twitch

Quick Menu

  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Menu
  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Copyright © Lectron, Inc. | All rights reserved
Trademarked with United States Patent and Trademark Office