DoS Attack


In computation, a denial of service attack (DoS attack) is a network attack, and the perpetrator interrupted the connection to the Internet host service temporarily or indefinitely, and the computer user could not use the machine or network resources. Denial of service usually tries to overload the system by dropping target machines or resources with excessive requests and ensuring that certain or all legitimate requests are not met.
In distributed denial of service attacks (DDoS attacks), victim traffic originates from many different sources. This makes it virtually impossible to prevent attacks by blocking a single source.
DoS attacks and DDoS attacks are similar to groups of crowded people entering and exiting stores and businesses. Legitimate parties can not enter shops or businesses or interrupt normal operations.
DoS attack criminals often rely on banks and credit cards to pay for sites and services hosted on high profile web servers such as gateways. Revenge, persecution, and behaviorism can stimulate these attacks.

How to be safe from DoS attack

1. Black Hole & Sink


All traffic using the black hole root, attacked DNS, or IP address is sent to the "black hole" (empty interface or non-existent server). It is more efficient and can be managed by ISP in order not to affect the network connection. The DNS channel analyzes the traffic and routes traffic to valid IP addresses that deny malicious packets. For most serious attacks, sinking is not efficient.

2. IPS-based prevention

Intrusion Prevention System (IPS) is effective if an attack is associated with that signature. However, the tendency of attack is to have legal content, but its intention is not good. Content-aware intrusion prevention systems can not prevent behavior-based DoS attacks. ASIC-based IPS analyzes attacks and subdivisions and operates in an automated way like a circuit breaker, so it can detect and block denial of service attacks. To analyze traffic, continuously monitor traffic patterns, and determine whether traffic anomalies exist, it is necessary to break down rate-based IPS (RBIPS). You need to prevent DoS attack traffic from legitimate traffic.

            Thanks:

Hope you guys will like it I will update it later. Thanks for your support in advance!

Comments

Popular Posts