DDoS란? (Distributed Denial-of–Service)
DDoS는 여러 대의 컴퓨터가 한 대상에 대규모 트래픽을 보내어 응답을 하지 못하도록 하여 사용자들이 서비스에 접근하지 못하도록 하는 공격의 행태이다. 해당 요청들은 이를 수신한 여러 컴퓨터로 하여금 공격대상의 IP로 트래픽을 보내게 한다.
A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer or network. A denial-of-service condition is accomplished by flooding the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users. DoS attacks can cost an organization both time and money while their resources and services are inaccessible.
What are common denial-of-service attacks?
There are many different methods for carrying out a DoS attack. The most common method of attack occurs when an attacker floods a network server with traffic. In this type of DoS attack, the attacker sends several requests to the target server, overloading it with traffic. These service requests are illegitimate and have fabricated return addresses, which mislead the server when it tries to authenticate the requestor. As the junk requests are processed constantly, the server is overwhelmed, which causes a DoS condition to legitimate requestors.
- In a Smurf Attack, the attacker sends Internet Control Message Protocol broadcast packets to a number of hosts with a spoofed source Internet Protocol (IP) address that belongs to the target machine. The recipients of these spoofed packets will then respond, and the targeted host will be flooded with those responses.
- A SYN flood occurs when an attacker sends a request to connect to the target server but does not complete the connection through what is known as a three-way handshake—a method used in a Transmission Control Protocol (TCP)/IP network to create a connection between a local host/client and server. The incomplete handshake leaves the connected port in an occupied status and unavailable for further requests. An attacker will continue to send requests, saturating all open ports, so that legitimate users cannot connect.
'Computer > Network' 카테고리의 다른 글
[Term] Dump? (0) | 2022.09.14 |
---|---|
[Term] SEO? (0) | 2022.09.14 |
[cmd-Net] MacOS의 Terminal에서 Hosts 파일을 열고 편집하는 방법 (0) | 2022.09.13 |
[Term] News aggregator? (0) | 2022.09.13 |
[cmd] Linux/macOS/Unix 커맨드 라인 구문 (0) | 2022.09.09 |
댓글