ddos attack Practices for Prevention

The "amplification" part comes in when you understand that many UDP services generate replies that are much larger than the initial request size. For instance, the Domain Name Service (DNS) has a bandwidth amplification factor of 28 to 54 (the reply to a DNS request can be between 28 and 54 times larger than the request). The Network Time Protocol (NTP) has a bandwidth amplification factor of 556. By combining reflection (the server sends reply traffic to a spoofed source address) with amplification (the reply traffic is a lot larger than the initial request), attackers can do a lot of damage to a victim with very little effort on their part. A number of UDP-based applications and services can be used to generate amplification and reflection attacks, including DNS, NTP, Simple Service Discovery Protocol (SSDP), and Simple Network Management Protocol (SNMP).

It is criminal or illegal to launch a DOS or DDOS attack, but they happen anyway. While the criminal aspect is apparent, the motivations are not always clear. One example of a high profile attack was in 2014 when a hacking group pulled down Sony and Microsoft gaming services on Christmas day. Millions of people could not make use of their games consoles as disruptions played havoc after a cyber attack.This was in fact DDoS that overloaded both Microsoft and Sony gaming services by generating fake access services.

The hacker claimed to be from Lizard Squad, a 22year old who was audacious enough to say he did it just to prove he can. It is apparent that denying an internet service can have severe repercussions on different types of organizations. Targets of severe attacks include countries Estonia and Burma. They suffered attacks from a botnet known as Conficker resulting in their entire internet capabilities getting crippled.
More Info: what is a ddos attack

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis