Linux and Networking

Linux and Networking

5.2.1 DDOS: massive DOS attacks

In this variant, cybercriminals do not attack from a single computer, but rather overload the systems targeted by the attack with simultaneous requests from several computers, which can form giant bot networks.

With such a network, much more traffic can be generated than would be possible with a DoS attack, which starts from a single computer. Therefore, a DDoS attack has drastic consequences for affected systems that often have little chance of identifying the actual source of the attack.

This is mainly because, to build these botnets, attackers operate special software agents that, through the Internet and without the operator’s consent, are placed on computers that do not have the appropriate protection system and are there. control centrally.

It is common for this type of “infection” to take place a few months before the DDoS attack itself.

The Demeter Project