IS USING INTERNET SAFE?

Image
Many people surf the Internet as part of their work activities, others visit a wide range of pages to stay fully informed of the news in the world, perhaps simply to complement their educational training or to entertain themselves during leisure hours. But everyone wonders if it is really possible to surf safely on the internet and that is precisely what this article is about. What Is Internet Security? Within the operating rules and policies that are part of the management of the websites to which users have access, a series of parameters have been established in order to prevent and control unauthorized entry to the resources available within Internet. This is part of internet security and its goal is to maintain a level that allows users to enter each page without risks to their computer or the integrity of their personal information. Therefore, talking about security is having ways to prevent, protect and avoid unauthorized intrusion to private networks, such as corporate or ev...

EVERYTHING ABOUT DDoS ATTACK

A DDoS attack (Distributed Denial of Service) or in French "denial of service attack" is a computer attack consisting in targeting a computer system by flooding it with incoming messages or connection requests in order to cause a denial of service . Find out all you would like to understand about it.

Everything about DDos Attack
The initials DDoS denote the term Distributed Denial of Service. In French, we mention a denial of service attack. This is a computer attack type of DOS (Denial Attack on Service) of attacking a computer system using a large number of hijacked computer systems (or intentionally used).

Examples of attacks

At the beginning of September, Wikipedia suffered an attack that affected its European infrastructure. The Spanish, French, Polish, Croatian, Austrian, German, British and Russian versions were not fully accessible. At the same time, Blizzard, the publisher of the World of Warcraft video game, reported a DDoS targeting the Classic version of the MMORPG. Again, users could not log in for several hours. Here, the targeted structures are not of vital importance. However, this causes great economic losses. In some cases, the targets are hospitals or administrations that manage sensitive data or operate critical services.

DDoS: How Do Denial of Service Attacks Work?

Typically, in a typical DDoS attack, the cybercriminal (DDoS Master) first takes control of many computer systems using malware or bypassing their security systems. It then creates a command-and-control type server. This one gives directives to its network of hijacked systems which one also calls botnet. Once the network is assembled, the DDoS Master can order his army to generate artificial traffic on the targeted system. It then sends a large number of requests to weaken its target, usually a web server.

How Do You Know If You Have A DDoS?

The targeted computer system then experiences unusually high traffic from a large number of sources. Several hundred or even several thousand hijacked systems can request the targeted system simultaneously. This causes a denial of service. That is, the service becomes unavailable for its legitimate users.

The use of a large number of hijacked systems makes the attack very difficult to ward off. It is impossible to stop the attack by blocking a single IP address. Moreover, distinguishing a legitimate user from a hijacked system is very difficult

In some cases, it should be noted that the computer systems used to request the targeted system are not always hijacked. It happens that a large number of Internet users voluntarily join the cause of a cybercriminal and all attack the same system simultaneously to cause the denial of service. However, when a system is well encoded, updated, stable and secure, legitimate requests are not expected to cause a denial of service.

What Are The Different Types Of DDoS Attacks?

There are many different types of DDoS attacks. There are, however, three main categories. The attack traffic (traffic attacks) are the most common. They consist in sending an immense volume of TCP, UDP and ICPM packets to the target. Thus, legitimate requests are lost. These attacks can be carried out through the exploitation of malware.

The attacks of bandwidth are to overload the target of unnecessary data. This causes a loss of bandwidth and of the resources necessary for its operation, causing a denial of service.

Finally, application attacks consist in sending large numbers of messages to the targeted application to consume its resources, making the resources of the target system unavailable.

How to Avoid Them?

In an article published on the ANSSI website, the authority shares a document in which there are means to reduce the effects of DDoS. One of the solutions is to deploy filtering equipment at the edge of an information system. However, this only partially protects the company. If the attacks exceed the capabilities of the network links then the attacker can make their way. Equipment capable of offering this partial protection are, for example, firewalls.

Specialized equipment is also used which allows specific filtering rules to be established and requests to be limited. Unfortunately some countermeasures are not directly applied. This extended response time of a few minutes is enough to cause extensive damage.

Comments

Popular posts from this blog

HOW TO STAY UP TO DATE ABOUT KEEPING DATA SAFE?

COMPANIES INTERNET SECURITY

IS USING INTERNET SAFE?