Difference between DoS and DDoS attacks

Generally, wheter they are applicative or network, the difference between DoS and DDoS is in the way to distribute the attack. A DoS is distributed from only one starting point, whereas a DDoS implies several computers or servers.

A typical DoS (Denial of Service) attack, for instance, would be to send 10 Gb/s from the same IP adress / machine to a targeted server to saturate its network connection of only 1Gb/s.

A typical DDoS (Distributed Denial of Service) attack would be to send 1Gb/s from 10 different servers and to block a targeted server using a 1 Gb/s connection. The result is the same, but because of the variety of resources, the attack is a bit more complex to block.

Enterprises require proactive DDoS defense services to mitigate the attacks as they emerge. The fact that such attacks were driven by insecure IoT devices, which are trivially easy to identify and exploit, is deeply concerning as it exposes tremendous firepower to even small, unsophisticated groups of attackers. The CodeRed and Nimda worms launched in 2001 turned out to be the tipping point that led to the release of Bill Gates' famed Trustworthy Computing memo in January 2002. That was a seminal moment for software security. It was the moment that software vendors turned the corner and began "baking security in" as opposed to "brushing it on." The massive IoT-powered DDoS attacks against krebsonsecurity and Dyn need to serve as a wakeup call for hardware vendors. This needs to be the seminal moment that leads hardware vendors to turn the corner on security.

More Info: define ddos

Comments

  1. A docage electronic signature is a legal form of digital signature which enables the user to conveniently sign and send documents from a remote system. This blog will look at different services that help you with electronic signatures. These may include signing, storing, validating and authorization all of which are a part of electronic signatures.

    ReplyDelete

Post a Comment

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis