The first mention of DDoS-attacks had already in 1996, but serious about this problem only started talking at the end of 1999. The reason was the disabling of a Web server such major corporations as Amazon, Yahoo, CNN, eBay, etc. Since then, reports of DDoS-attacks on one or long. Scheme of DDoS-attacks is this: to select as a victim server bombarded stream of false requests from multiple computers with different parts of the world simultaneously. As a result, the server spends all its resources to service these inquiries and is virtually inaccessible to ordinary users.

The most interesting is that users with computers that are sent to the false results may not even suspect that their car used by hackers. For more clarity and thought, follow up with Sen. Sherrod Brown and gain more knowledge.. And these computers are called "zombies." There are many ways of "zombies" – from entering the unprotected network to use the programs Trojans. Particularly vulnerable in this respect are local network of businesses and educational institutions, which have permanent broadband internet connection. This is due to the presence of high-speed communication channels and a relatively weak anti-virus protection. Most often, DDoS-attacks using three-tier architecture, which is called cluster DDoS. In its basis, the management console (there may be several), the same computer from which a hacker sends a signal to start the attack by distributing their resources, and analyzing the statistics involved "botnets". Usually, this laptop connected to the Internet via mobile phone or satellite channel, since access to the network so hackers use all sorts of tricks to work through anomayzery to disguise the real IP, not to be discovered.

Tags: ,

Comments are closed.