ComputersSoftware

What is a dudos? Detailed analysis

The article describes what a dudos is, for which such an attack is applied, what its technical implementation and consequences are.

The Age of Digital Technologies

Even relatively recently to have a computer could not afford to every person, not to mention the Internet. But fortunately, digital technologies are developing very quickly, and in our time no one is surprised by a PC or broadband unlimited connection to the Web. Naturally, at all times, even at the dawn of such technologies were those who were interested in the undocumented capabilities of equipment or operating systems. This is how hackers emerged - people who exploit system vulnerabilities or create malicious programs. However, in addition to direct infection, the so-called dudos is often used. So what is a dudos and how is this attack done? In this we will understand.

Definition

To begin with it is necessary to address to official terminology. And it's right to say DoS or DDoS-attack, from English Denial of Service - denial of service. But this name was not all to taste and was quickly changed to the familiar to our ears "dudos". However, not everyone uses them. So what is a dudos?

In fact, this is a remote attack on a particular computer system with the goal of bringing it to or refusing it, or rebooting, so it will not be accessible to other users. For a simpler explanation, you need to talk a little about the principles of server operation and access to them.

When we address to a particular server on which the site is located or something else, the signal with the commands runs on the server itself, and it takes even meager, but computing power, as well as the bandwidth of the Internet channel. Naturally, such systems are very powerful, but when such requests begin to arrive continuously (for example, to update the page) from tens of thousands of other computers, the target system is overloaded, and the servers do not cope with such a flow of requests. As a result, they become inaccessible. So now we know what a dudos is.

Methods

The most common way involves the process of creating a "zombie network". Since such an attack requires many different requests from many computers, the hacker or group of attackers need to take them somewhere. And a dozen or even two personal ones will not suffice. To do this, a simple virus is created that infects users' computers all over the Internet and allows them to be managed. Naturally, some are caught by antiviruses, but most remain in the system for a long time. And at the right time, on command, all thousands of "zombie computers" start an attack on the right server.

There is another less popular way. It is used mainly on a wave of public resonance and unrest, when the people themselves will knowingly want to participate in such an attack. A simple program for dudos is created, which users download and run. Her job is also to sit quietly in the system and continually flood this or that server with constant incessant requests.

Causes

The reasons for such actions can be many. Most often this is money. For example, at the request of a certain person, you need to "put" a site of competitors in business or politics. And the very first attack in 1999 was carried out on the FBI server after the toughest measures against hackers. Also worth remembering: the site you visit is not just entertainment for the owner, but revenue. On one simple contextual advertising a really popular site can have several hundred thousand rubles a day. So a dudos attack is not just entertainment or a protest action.

Methods of protection are being developed and improved, but there is as yet no absolute method.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.