DDoS is short for Distributed Denial of Service.
DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
How DDoS Attacks Work
According to this report on eSecurityPlanet, in a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.
The Difference Between DoS and DDos Attacks
A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets.
Types of DDoS Attacks
There are many types of DDoS attacks. Common attacks include the following:
Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.
Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.
Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target’s system services unavailable.
Pronounced deck, and short for Digital Equipment Corporation, one of leading producers of workstations, servers, and high-end PCs. DEC also developed one of the leading Internet search engines called Alta Vista. In January, 1998, DEC agreed to be acquired by Compaq, which was then acquired by Hewlett-Packard.
Short for Digital Enhanced Cordless Telecommunications DECT is a digital wireless technology that originated in Europe, but is now used worldwide. DECT is a radio technology for voice data applications (such as cordless telephones, wireless offices and even wireless telephone lines to the home). DECT uses time division multiple access (TDMA) to transmit radio signals […]
Short for directory enabled network, a type of network that is managed from a central location. A DEN stores information about its users, network resources and applications in a database so that its operation can be managed from a central point by the network administrator. Any user that has an identification in the network can […]
Data Execution Prevention (DEP) helps prevent damage from viruses and other security threats that attack by running (executing) malicious code from memory locations that only Windows and other programs should use. This type of threat causes damage by taking over one or more memory locations in use by a program. Then it spreads and harms […]
Short for Data Encryption Standard, a popular symmetric-key encryption method developed in 1975 and standardized by ANSI in 1981 as ANSI X.3.92. DES uses a 56-bit key and uses the block cipher method, which breaks text into 64-bit blocks and then encrypts them.