请输入您要查询的百科知识:

 

词条 Hit-and-run DDoS
释义

  1. Method of attack

  2. See also

  3. References

{{notability|Neologisms|date=August 2014}}{{more citations needed|date=August 2014}}Hit-and-run DDoS is a type of denial-of-service (DDoS) attack that uses short bursts of high volume attacks in random intervals, spanning a time frame of days or weeks. The purpose of a hit-and-run DDoS is to prevent a user of a service from using that service by bringing down the host server.[1] This type of attack is to be distinguished from a persistent DDoS attack which continues until the attacker stops the attack or the host server is able to defend against it.[2]

Method of attack

A DDoS attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service.[3] A hit-and-run DDoS is accomplished by using high volume network or application attacks in short bursts. The attacks only last long enough to bring down the server hosting the service, normally 20 to 60 minutes. The attack is then repeated every 12 to 24 hours over a period of days or weeks, causing issues for the company hosting the service.

Hit-and-run DDoS is sometimes used as a test DDoS attack. An attacker will inject a few bad packets into a network to test if it is online and functioning. Once the network is verified as functioning, an attacker will then use a persistent DDoS attack.[4]

Hit-and-run DDoS exploits anti-DDoS software and services which are used to defend against prolonged DDoS attacks. Activating such software can take longer than the actual attack, allowing a denial of service before DDoS protection can start to defend from the attack.

See also

  • Billion laughs
  • Computer crime
  • Smurf attack

References

1. ^{{cite book | last =EC-Council| title =Computer Forensics: Investigating Network Intrusions and Cyber Crime | publisher =Cengage Learning| date =2009| isbn =9781435483521}}
2. ^{{cite book|last1=Wiles|first1=Jack|last2=Reyes|first2=Anthony|title=The Best Damn Cybercrime and Digital Forensics Book Period|url=https://books.google.com/books?id=hI3dqOyboegC&pg=PA559|year=2011|publisher=Syngress|isbn=978-0-08-055608-6|page=559}}
3. ^{{cite news | last =Richmond | first =Riva | coauthors = | title =What ‘DDoS’ Attacks Are and How to Survive Them | newspaper =Entrepreneur| url =http://www.entrepreneur.com/article/224099 | accessdate =28 January 2014 }}
4. ^{{cite book|author=EC-Council|title=Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems|url=https://books.google.com/books?id=LYFoU2HG_AkC&pg=SA3-PA11|year=2009|publisher=Cengage Learning|isbn=1-4354-8364-2|page=3}}

2 : Denial-of-service attacks|Cyberwarfare

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/23 14:31:02