Nowadays denial of service (DDoS) is a common type of cyber attack, Using this attack attacker make the resource unavailable to intended users.
Unlike other kind of cyberattacks, which are typically launched to establish a long-term connection and steal sensitive information from the server , denial of service attack do not attempt to breach your security perimeter.It attempt to make your website and servers unavailable to intended users. In some cases, however, DDoS is also used as a smokescreen for other malicious activities, and to take down security appliances (e.g., web application firewalls).
DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
Mainly there are two type of DDos attacks
- Network-centric attack
- System-centric attack
- Network-centric attack :In this type of attack the target is network only, Attacker is giving order to the infected systems to target the network. After getting order from attacker all the infected system will send request to the network and try to make unavailable the network.
- System-centric attack: In this type of attack infected system will make target the system to make it unavailable to the intended users.
Other types of DDos Attacks
3. Traffic attacks
4. Application attacks
The Difference Between DoS and DDos Attacks
A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets.
Application layer 7 DDoS attacks
OSI Application layer 7 (L7) attacks may not create such high volumes of network traffic, but they can harm your website in a more devastating way.
Many of the high profile e-commerce website outages are the result of Layer 7 application attacks. The biggest issue is that Layer 7 attacks can change and randomize very fast. Anything a visitor can access an attacker can too – and it looks the same to an IT administrator. Application layer attacks can be especially tricky to mitigate, because you do not want to block legitimate users. But there are still ways to do it with DDoS mitigation software and hardware, such as rate limiting rules, CAPTCHAs, black listing IP addresses, and more. DDoS mitigation service technicians can monitor and analyze an attack while it’s happening to minimize damage.
Read other Security articles
Subscribe for latest Security Updates