Monday, March 2, 2020

How Does a DDoS Attack Work

From one or more computers designated as the command and control (C&C) server, the attacker sends remote “launch” instructions to the bots. Collectively, these systems provide enough power to carry out massive attacks—far larger than those launched from a single source. And by using a botnet, attackers are able to hide their identity because the attack originates from many different systems that all appear to be legitimate.

It was an attack that would forever change how denial-of-service attacks would be viewed. In early 2000, Canadian high school student Michael Calce, a.k.a. MafiaBoy, whacked Yahoo! with a distributed denial of service (DDoS) attack that managed to shut down one of the leading web powerhouses of the time. Over the course of the week that followed, Calce took aim, and successfully disrupted, other such sites as Amazon, CNN and eBay.

Certainly not the first DDoS attack, but that highly public and successful series of attacks transformed denial of service attacks from novelty and minor nuisance to powerful business disruptors in the minds of CISOs and CIOs forever.

Since then, DDoS attacks have become an all too frequent menace, as they are commonly used to exact revenge, conduct extortion, as a means of online activism, and even to wage cyberwar.

More Info: distributed denial of service (ddos) attack

1 comment:

  1. DBA program thesis and research coordinator at European University’s Business School in Spain
    Spiredesk
    Spiredesk
    Spiredesk
    Spiredesk
    Spiredesk
    What’s driving demand? Quite simply, as Bianchi says, “without solving [these issues] in the short term, life on Earth may become seriously jeopardized, or at least unpredictably complex.

    ReplyDelete