'); } ?>

Hacker attacks DDOS (Distributed Denial of Service)


DOS attacks are one of the most used hacker strategies . Unlike viruses, worms and Trojans carry out these attacks permanent damage (deletion of data from hard disk, stealing passwords or credit card numbers) but cause disabling operation of a resource (eg. Someone server). The first DOS attacks are used with simple tools that generate and receive packets from one place to another.

Over time they have been improved in carry out attacks from a single source to multiple targets from multiple sources to one or more target resources more goals. DOS attacks are executed using DOS tools that send a large number of packets over the Internet. These packages flooding (Usability flood) resources to the victim and thus “victims” remain unused. Each computer or any device that is connected to the internet and has network services based on TCP (Transmission Control Protocol) are potential victims.


DOS attacks can be divided into software utilization and flooding (Usability flooding). Flooding attacks are based on one rule: he who has the most bandwidth wins. Attacks by flooding can be divided into Stroke single source attack or multiple sources attack with reflection. The attacks with one source is a striker who flood victims, while attacks with more resources are more attackers. In both cases you can use the extra zombie computers (zombie is a computer that has been infected previously with use of a security failure). Such computer contains a hidden program that allows remote control of the computer.


Reflection attacks are special cases of Stroke from multiple sources. They are used for concealing the identity of the actual attacker or larger attack. Reflector is any computer that meets the requirements. Any computer can be used as a reflector by adding IP address of the computer-sacrifice in the original scope of the claim. By adding this information computer – Spotlight will send a reply to the victim rather than the attacker. If there are many computers – spotlights the result of DoS attack will be. The difference between zombie computer and computer-reflector lights that are legal users of Internet services. For this attack using the reflection is very difficult to destroy.


Advanced form of DoS attack is a DDoS (Distributed Denial of Service) in which Trojan – striker installed on multiple computers and also performs attacks from multiple locations at the same time. This attack is one of the most powerful software attacks that has ever been discovered. The DDoS attacks have been a few times and disconnected servers largest websites, such as Yahoo, eBay, Amazon, CNN and many others.

This type of attack is most unpredictable and it is very difficult to stop such attacks because hackers use several hundred or more previously infected computers that are under its control (zombie) and use their power ie their Internet connection attacking a web server or an ordinary computer. They do this so that ping the victim of all computers that are under its control at the same time. It does so by special software that controls all the computers that are under its control. Pinging of a victim of the great internet connectivity will lead to overload the network capacity (buffer overflow) the specific server or computer as the victim of this attack, then of course there will be a drop in the system. One measure used by large companies to guard against this type of attack is the installation of specialized software that controls the flow of data. If an IP address requested (request) much more data than a given limit, the software automatically interrupts the flow of data to the IP address until the claim data from the IP address does not fall below normal.

Solution to this problem have announced two companies from Boston, U.S. companies which themselves are great competitors on the world market. It Arbor Networks Inc. and Mazu Networks Inc. revealing a completely new tactic in the fight against attacks ie prevent attacks before they reach servers. It represent way to intercept attacks before or the so-called peering points on the Internet, the Web site provider firms merge with backbone-s, ie the main “roads” on the web. Those points will be installed with a special software that can distinguish between normal traffic and packets with bogus claims. Next step is to locate the attacker, or computers that are directed their attacks and isolation. Thus detected PC will be disconnected and the attack will not reach his destination.

The following graph shows the comparison of damage caused by DoS attacks and other claims during 2000 and 2006 in the USA.


One Response to Hacker attacks DDOS (Distributed Denial of Service)

  1. BennyN says:

    I noticed that it’s hard to find your site in google, i found it on 24th spot, you should
    create some social bookmarks to rank it in google and increase traffic. I had the same problem with my site, your should search in google for – Insane google ranking boost – it helped me a lot

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>