D-DOS against the Internet What is DDoS cyber attack?
[ad_1]
According to Hamshahri Online, He wrote in an editorial: “Despite the increase in the level of distributed denial of service (DDoS) attacks in the last week, the country’s communication network is stable; Although one of the operators had a traffic drop, which should be notified and compensated.”
What are DDoS attacks?
DDoS is an acronym for Distributed Denial of Service, meaning a type of cyber attack in which an online service or resource is targeted with a large number of unusual or malicious requests. The main purpose of these attacks is to use the access of the attacked service to cause the interruption of access to the attacked service or website.
How does DDoS cause disruption?
In DDoS attacks, a large number of devices, usually multiple computers controlled by hackers, simultaneously send requests or traffic to a service or website. This extra and unusual traffic can increase the load of the service to such an extent that it can be removed from the reach of normal users, cause disruption in the service and, as a result, cause the destruction of the service or the website. The most important feature of DDoS attacks is that they use multiple and diverse sources across the Internet.
These sources can include computers belonging to normal users that have been controlled by hackers using malicious software or smart devices connected to the Internet such as security cameras or even servers located in data centers. By exploiting these different sources, attackers can easily direct a large amount of traffic to their target and cause a service interruption.
Read more:
How to prevent these attacks
DDoS attacks can be carried out for various purposes, including revenge, disruption of a service or website, or even to occupy server resources. As one of the protection methods, administrators of systems and websites should consider methods of dealing with DDoS attacks; including the use of firewalls, attack detection systems and traffic management tools.
[ad_2]
Original Source Link