The progression of a DDoS attack

OVH created the anti-DDoS solution precisely to fight against these distributed denial-of-service attacks. With all of our services, we include a migration solution based on a unique technology, which combines three technologies to:
analyze data packets quickly in real-time
divert your server’s incoming traffic
separate non-legitimate requests from others and let legitimate traffic pass through
The server is operational. It sends and receives packets normally.
A DDoS attack starts in different ways — it may overload the bandwidth, or overwhelm the system resources.


You’ve just arrived home after a long work day, so long in fact that night has already set in. You wander a bit through the darkness, turn on the lights, grab two slices of bread, and put them into that old, creaking toaster. It’s nothing fancy, just a quick and dirty snack until you undress, unwind and cook a proper dish.

The moment you push down on the button to toast the bread, you hear a loud pop, and all of the lights suddenly go out.
The network becomes overloaded, and the server is then unable to process legitimate packets among the mass of incoming data.

This category of attacks attempts to create congestion by consuming all available bandwidth between the target and the wider Internet. Large amounts of data are sent to a target using a form of amplification, or by other means of creating massive traffic, such as requests from a botnet.


More Info: ddos attacks examples

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis