The phenomenon occurs due to technical limitations of the server – the computer on which the site is installed. The Internet is a network of such machines from all over the world. These can be both ordinary home computers and DDoS attacks. huge data centers belonging to international corporations. In any case, the computing power is not infinite. If too list to data many requests come in per unit of time, the server will stop working.
DoS is a fairly common event in the world. News resources experience failures after the publication of sensational reports. Government portals have problems during the season of filing applications for benefits. Hotel pages experience difficulties b42 on grand tour – the gutenberg bible during the peak of tourist activity. Everyone is accustomed to temporary shutdowns due to natural causes. They cause practically no harm. Intentional actions of intruders lead to a completely different result.
What is a DDoS attack
DDoS literally translates as “distributed denial of service.” In this case, the increased load on the site is caused in an organized manner. Seemingly chaotic requests are controlled from the outside. This is called a DDoS attack or simply a DoS attack.
Hackers intentionally send a lot of DDoS attacks. requests to the server, pursuing profit. Victims are not only small resources with low bandwidth, but also objects europe email of hosting providers with huge capacities. An attack on the target site is accompanied by meaningless requests. An unprotected resource is forced to process everything.
For some objects, a couple of hundred requests are enough to fail. If the capacity is high, cybercriminals generate hundreds of thousands of messages, including complex ones. The processor deals with them for a long time. This leads to overload of the server and incoming traffic.
How they work
A DDoS attack is a multitude of requests from different devices: computers, smartphones, tablets, even smart kettles and TVs. All of them are first infected with a virus via email, a suspicious link or hacked software from a torrent tracker. After that, the gadget becomes part of a botnet and obeys the hacker.
The user does not even suspect that their device is infected. The virus does not harm the carrier, but waits for a command from the outside. As soon as it arrives, the bots generate requests to the specified IP address. The larger the botnet, the more powerful the attack. It is measured in bits, like the bandwidth of the communication channel. The average attack power in 2020 was 70-100 Gbit. This is enough to disable even large resources, such as Amazon or AliExpress.