Sei sulla pagina 1di 3

A DoS attack is a denial of service attack where a computer (or computers) is used to flood a server

with TCP and UDP packets. A DDoS attack is where multiple systems target a single system with
a DoS attack. The targeted network is then bombarded with packets from multiple locations.

There are a number of different ways that DoS attacks can be used. These include the following:

• Buffer overflow attacks – This type of attack is the most common DOS attack experienced.
Under this attack the attacker overloads a network address with traffic so that it is put out of
use.
• Ping of Death or ICMP flood – An ICMP flood attack is used to take unconfigured or
misconfigured network devices and uses them to send spoof packets to ping every computer
within the network. This is also known as a ping of death (POD) attack.
• SYN flood – SYN flood attacks send requests to connect to a server but don’t complete the
handshake. The end result is that the network becomes inundated with connection requests
that prevent anyone from connecting to the network.
• Teardrop Attack – During a teardrop DOS attack an attacker sends IP data packet fragments
to a network. The network then attempts to recompile these fragments into their original
packets. The process of compiling these fragments exhausts the system and it ends up
crashing. It crashes because the fields are designed to confuse the system so that it can not
put them back together.

There is much vulnerability existing in the virtual website world, which is likely to be used to
disturb your online services. DoS and DDoS are such common attacks that make site owners
suffer a lot. To better protect your website and online business from them, you need to get an
acquaintance of the 2 types of attacks. In the following part, we will introduce them in detail so
that you can take an immediate action once you find anything wrong on your site.
DoS Attack

DoS attack is a denial of service attack that makes attempts to make a server or network
resource unavailable to its users and visitors. To be specific, this attack uses one computer
and one Internet connection to send massive requests to a server at a time, interrupting or
suspending a host service connected to the Internet temporarily or indefinitely. If a web host
server suffers a serious DoS attack, all the websites hosted on this server will be very likely to
be inaccessible.

DoS attacks are quite complicated and not easy to be detected, for they can even be generated
by making use of the application vulnerability. The target of this kind of attack can be a
computer, a port of the target system, a network connection, and even some resources such as
disk space and bandwidth.

Moreover, attackers may use this attack to run malware, cause errors and even destroy the
OS. When it comes to how the attacks come into being, most attacks are launched by those who
are unsatisfied with a service, cyber-criminals and competitors.

DDoS Attack

DDoS attack is a distributed denial of service attack that uses more than one computer and IP
address distributed worldwide to put a heavy burden on a service. These attack sources are
often infected with virus that makes a server or service goes wrong.

Here we listed 3 common types of DDoS attack below:

• UDP flood attack. Attackers send a large number of udp packets to attack random
ports on the target, making the host find no application listening at that port and
reply with an icmp packet that is destination unreachable.
• SYN flood attack. This is also called the TCP three-way handshake in which attacker
sends a numerous SYN requests to a target system. It works by not responding to
the server with the expected ACK code, causing the server to send the SYN -ACK to a
wrong IP address.
• Slowloris. This tool keeps massive connections to the target server open for a very
time, and it sends http headers but not complete request continually, making a
website break down.
Differences Between Them

The first difference is that attackers use only one computer and one Internet connection when
launching a DoS attack, while attackers use a widely distributed network of computers and
many Internet connections in a DDoS attack. Another difference is that DoS attacks are much
easier to operate and lower in cost.

Besides, it is harder to withstand DDoS attacks because there are a large number of sources
sending requests to flood the target system. In that case, blocking out the sources is almost
impossible.

However, in a DoS attack, if the inward traffic is recognized as an abnormal traffic spike, hosts
can take immediate actions to block the source. That’s to say, a DoS attack is able to be blocked
in a relatively short time.

Summary

DoS and DDoS attacks are security issues that should be taken seriously, as they can make the
whole server break down if not handled timely and properly. Because of this, when you’re
choosing a web host, you need to consider a DDoS protection.

Nowadays there are numerous web hosts in the market, Bisend.com among one of them, is
making continuous efforts in providing powerful hosting solutions to satisfy your needs and
improving your website performance. You are assured that all of our services have DDoS
Attack Response, helping you get rid of the annoying attack.

Potrebbero piacerti anche