What Actually D/DoS Means? How Do One Fight Against D/DoS Attack?

DoS or DDoS attack

You might have heard about the term “DDoS” or “DoS”. It may be in news, article, or anywhere else on the Internet. All you might have guessed that it is terminology in hacking. But let’s not keep it myth anymore. In this article, we’re going to learn about the term “DDoS” or “DoS”.

Before we begin, you might be confused about why are we using two terms, “DDoS” and “DoS”. It is actually because they’re two types of attack. Although their work is the same, they’re of two type. Let’s first see it’s definition.

What Is D/DoS?

DDoS or DoS stands for Distributed / Denial Of Service attack launched by the hacker with an intention to take down the targeted server by flooding it with huge amount of traffic originated from a hacked machine. When the hacker triggers the attack, the targeted machine/website is targeted with huge amount of traffic, making it unavailable to respond due to the huge load.

There are two types of D/DoS attacks.

What Is Meant By DoS attack?

DoS stands for Denial of Service attack when the attack is originated from one single computer/machine to the targeted victim. This attack is however weak because of its volume. The attack power may vary depending on the Internet connection or originating computer’s ability to launch the attack.

How Do You Fight Against DoS attack?

Because of its singularity, it is easy to fight against such types of attacks. To do so, one can simply log their machine while an on-going attack, and once the IP address is trapped, it can be blocked when passing through the firewall. So when an attack is originated from blocked IP, the hacker’s origin computer shows either “Connection Refused” or “Not Responding” type error and the traffic is not reached to the victim.

What Is Meant By DDoS attack?

DDoS stands for Distributed Denial of Service attack where the attack is originated from multiple computers. By “multiple computers”, I mean to say, it can be 2 or more but in some cases, it can be hundreds of thousands of computers attacking one single target at once. Due to its nature, such attacks are mostly very strong and causes service unavailability/lagging because of multiple points of origin. The attack’s power is usually strong to very strong, depending on the army(computers originating attack)’s Internet connection or ability(specifications).

How Do You Fight Against DDoS attack?

Because of its multiple points of origin, the attack is very strong. There are usually millions of IP addresses involved in such attacks when launched on a massive scale. The majority of times, the computers/servers involved in the attack are infected. To prevent being infection removed, hackers usually take a very small amount of bandwidth from the infected computer(varying from 1-2 Mbps) which makes it undoubtful for the computer/server user. Due to such nature, it is mostly quite difficult to block such an attack due to its bandwidth transfer and the number of IP addresses involved.

However, smart firewalls such as Arbor and etc may help in such a scenario where IP addresses are checked for their reputations immediately when requested to enter and if the IP address is involved in the previous attack, then it’s access to the victim is denied. Another method could be the type of traffic being originated. The firewall checks for the browser and checks if it is a real human accessing the site or a bot trying to take it down. It could be done by checking the request header by putting up CAPTCHA that could be solved only by humans.


Conclusion

If you want to get your website protected against such attacks, you might be searching for firewalls. But did you know that such complex firewalls are too expensive for you to afford according to your budget? Don’t worry! If you’re using Shadow Hosting’s Web Hosting service, we’ve got you covered with smart firewalls, protecting you from DDoS attacks 24/7.

About Manal Shaikh 17 Articles
Manal Shaikh, the Founder of Shadow Networks International and CEO/Chairman of Shadow Hosting International. A cybersecurity analyst, network analyst and a web administrator.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


CommentLuv badge