Beware Of Botnets! Attackers Got 'DDoS' To Shut Down A Targeted System!

By Mary Lourd - 08 Dec '16 11:48AM
Close

A  Distributed Denial of Service (DDoS) is a type of DOS attack where multiple systems are compromised by overwhelming it with traffic from multiple sources, which are often infected with a Trojan virus. The attacker often targets a wide variety of important resources. Sometimes, they target banks, news websites, and government systems.

Denial of Service (DoS) is a cyber attack which typically uses one unit and one connection to shut down a targeted system or resource, while DDoS uses multiple computers and connections to flood the targeted system. DDoS uses thousands traffics and unique IP addresses. This DDoS attacks are often global and being distributed via botnets.

Botnets are attacker's build network of malicious software through websites, social media and emails. The system will be controlled remotely without the owner's knowledge and can be used to attack another resource. These botnets are millions strong machines and can generate huge floods of traffic to the targeted system.

The only way to stop the attack is to simply block a single IP (internet protocol) address. The challenge of blocking is hard to determine legitimate user traffic from the attacker's traffic because attackers are broadening across many points of origin. Common attacks where traffic attacks, bandwidth attacks and application attacks.

A traffic attacks are flooding more traffic to a targeted system by sending a huge volume of TCP (transmission control protocol), UDP (user datagram protocol), and ICPM (internet control message protocol) packets. These traffic attacks are accompanied by malware exploitation.

Bandwidth attacks are targeting massive quantities of junk data. These attacks may result in making a system unavailable. The lost of network bandwidth can lead to a complete denial of service. Application attacks are the worst. These attacks make the target's system services dead and the unavailable for the application layer data.

The Digital Attack Map contains global DDoS activity. Features included are the use of the histogram, the country selected color options for the level of attacks by classes and destination port, the news section to find online attackers' activity and the gallery for notable days of DDoS attacks.

The types of well known DDoS are from Smurfs to Teardrops, and to Pings to Death. Botnets are responsible for these amplifying attacks. These DDoS' botnets are sold secretly online and underground markets. The price is reasonable and it cost as little as $150. 

 

 

Fun Stuff

Join the Conversation

The Next Read

Real Time Analytics