•  Home
  •  Dashboard
  •  Company
    • About Us
    • Blog
    • Careers
    • Contact Us
    • Data Centers
    • Looking Glass
    • Network
    • Reseller
  •  Hosting Services
    • Infrastructure
      • iColocation
    • Compute
      • cMetal
      • cVirtual
    • Storage
      • sObject
      • sBlock
    • Networking
      • nCDN
      • nIP Transit
      • nWavelength
    • Protection
      • pBackup
      • pDDoS
  •  Solutions
    • Ecommerce
    • Finance
    • Gaming
    • Hosting
    • Management
    • Security
    • System Integrator
  •  Support
    • Community
    • Knowledge Base
    • Open A Ticket
  •  USA & Canada: 800-933-1517
  •  International: 626-549-2801
  •  Email: sales@psychz.net
  • Services
    • new-colocation-header-img
      Infrastructure
      • iColocation
    • new-compute-header-img
      Compute
      • cMetal
      • cVirtual
    • new-storage-header-img
      Storage
      • sObject
      • sBlock
    • new-networking-header-img
      Networking
      • nCDN
      • nIP Transit
      • nWavelength
    • new-protection-header-img
      Protection
      • pBackup
      • pDDoS
  • Solutions
    • Ecommerce
    • Security
    • Gaming
    • Hosting
    • Management
    • Finance
    • System Integrator
  • Dashboard

รายชื่อวิธีการโจมตีแบบ DDoS

  • Home
  • Client
  • Qa Forum
  • รายชื่อวิธีการโจมตีแบบ DDoS

Posted By: Sean | 1 Replies | Last Reply On: May 23, 2017 01:54:58

มีรายการวิธีการโจมตีแบบ DDoS ที่ผู้ใช้ใช้เพื่อนำเซิร์ฟเวอร์มาใช้งานแบบออฟไลน์หรือไม่?

Psychz - Manish

Votes: 0Posted On: May 23, 2017 01:54:58
 

Although, there are many forms of DDoS attacks that are used to bring the server offline, some are more effective than others. DDoS attacks can also be planned according to the different layers of the network. For instance, layer 7 attacks concentrate on the application layer of the server. Here are some of the major forms of DDoS attacks with their methods of attack and the effect they have on the server.

 

SYN Flood

When a host tries to send or receive data to or from the server under TCP protocol, it does so by establishing a connection first. As TCP is a connection-oriented protocol, it establishes a connection by a three-way handshaking process. It sends a SYN message to the server which in turn acknowledges by sending a SYN+ACK message to the remote host. The remote host, in return, sends the ACK message completing the handshaking process. In the case of DDOS attacks, the botnets keep sending the SYN messages to the server without responding to server's SYN+ACK message. This results in a large number of open connections depleting the server's bandwidth.

 

UDP Flood

Unlike TCP, UDP is a connectionless protocol. In case of UDP flood attack, the attackers constantly flood UDP packets to the server. The server checks for the application listening to that port but is forced to send ICMP Destination Unreachable packet as the requests are coming from a spoofed IP address.

 

HTTP Flood

this type of attack focuses on attacking a web server or application. The attackers flood the server with HTTP GET or POST requests forcing the server to allocate maximum resources resulting in Denial of Service.

 

Ping of Death

In this case, the attackers send continuous ping requests to the servers each of whose size is 65535 bytes. These packets are divided into packets and then is sent to the servers. When these packets are reassembled on the server side, they overflow the memory buffers allocated for the packets.

These were only some of the attacks that are used to perform a DDOS attack. These attacks can cause fatal to a server's performance and even bring it down. Hence, various preventive measures are taken by every large organization around the world to prevent and mitigate these DDOS attacks.

 

ICMP attack

This is a ping attack. ICMP attacks are a type of attack that floods the local network connections by sending a series of echo request to the victim, the victim then sends an excessive amount of echo responds to the attack, but the attack may not have a routable destination due to the IP being spoofed.

 

Was this reply helpful?

Related topics

  • What is DDoS and How to Protect Against a DDoS Attack
  • Layer 7 DDoS
  • How to temporarily/permanently enable DDoS IP diversion for a Single IP Address?
  • บรรเทาสาธารณภัย DDoS
  • ต้อง Datacenter ที่มีการป้องกัน DDoS
  • ซื้อการป้องกัน DDoS
  • DDoS Protected VPS Hosting
  • 100 Gbps DDoS Protection
  • Complete Guide To Psychz's CDN
  • Reference Architecture - Active-Active Configuration (Using CDN)
  • DDoS กรรโชก: บิดสามานย์ล่าสุดเกี่ยวกับอาชญากรรมไซเบอร์
  • ระเบียน A ฉาวโฉ่ Set - ใหญ่ที่สุดในโลกโจมตี DDoS
  • Best 10Gbps Unmetered Dedicated Server In North America - Top 10 List
  • จริงจังใหม่โจมตี DDoS พื้นผิววิธี; ขู่ผู้ให้บริการอินเทอร์เน็ตธุรกิจ
  • การโจมตี DDoS ยังคงอยู่ในความรุ่งโรจน์
Copyright © 2025 Psychz Networks,
A Profuse Solutions Inc Company
Hosting Services
Infrastructure
  • iColocation
Compute
  • cMetal
  • cVirtual
Storage
  • sObject
  • sBlock
Networking
  • nCDN
  • nIP Transit
  • nWavelength
Protection
  • pBackup
  • pDDoS
Company
  • About Us
  • Blog
  • Careers
  • Contact Us
  • Data Centers
  • Looking Glass
  • Network
  • Reseller
Policies
  • Acceptable Usage Policy
  • Privacy Policy
  • Service Level Agreement
  • Terms and Conditions
Support
  • Community
  • Knowledge Base
  • Open A Ticket
Get In Touch
  • Psychz Networks,
    A Profuse Solutions Company
    611 Wilshire Blvd #300
    Los Angeles,California 90017
    USA
  • US/Canada: 800-933-1517
  • International: 626-549-2801