{"id":702,"date":"2024-10-30T19:36:46","date_gmt":"2024-10-30T13:51:46","guid":{"rendered":"https:\/\/www.bisup.com\/?p=702"},"modified":"2024-10-30T19:36:46","modified_gmt":"2024-10-30T13:51:46","slug":"what-is-ddos-how-to-protect-your-network-from-it","status":"publish","type":"post","link":"https:\/\/www.bisup.com\/blog\/what-is-ddos-how-to-protect-your-network-from-it\/","title":{"rendered":"What is DDoS? How to Protect your network from it?"},"content":{"rendered":"\n<p>DDoS stands for Distributed Denial of the Server, as its name indicates it.<\/p>\n\n\n\n<p>This is a service mitigation attack that uses multiple servers or machines operating from different locations to attack a single server or web application. Target is bombarded with a load of traffic to stop its services; these attacks are mostly made for ransom from the attacker so that owner of the website could pay for his services to be run properly. These attacks can last for days, starting from hours. The longest DDOS attack recorded was Q2 209, which lasted 509 hours or simply more than 21 days.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-ddos-attack-types\"><strong>Common DDOS attack Types<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"udp-flood\"><strong>UDP Flood<\/strong><\/h3>\n\n\n\n<p>A user datagram protocol is used in <a href=\"https:\/\/www.bisup.com\/blog\/what-is-network-latency-why-it-slows-down-your-site\/\" title=\"What Is Network Latency? Why It Slows Down Your Site\"  data-wpil-monitor-id=\"1\">DDoS<\/a> attacks with the help of which a number of UDP packets were sent to the victim host on random ports so that the host is busy checking the following list.<\/p>\n\n\n\n<p>Application listening at the requested port.<\/p>\n\n\n\n<p>See that no application is listening<\/p>\n\n\n\n<p>Reply with a packet that the host is unreachable<\/p>\n\n\n\n<p>When the victimized host receives multiple requests, they will be busy answering all packets and will be unreachable to other clients.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"icmp-flood\"><strong>ICMP Flood<\/strong><\/h3>\n\n\n\n<p>Internet Control Message Protocol, commonly known as ping by network analysts, is used in DDoS attacks, which helps attackers send multiple ping requests to targeted hosts and receive back the transmitted packets. Usually, ping requests are used to test whether a host in the network is working or not, but if multiple ping requests are sent to a single server or machine, that will be down. There are several commands which can help in a DDoS attack, like ping -n, ping -t, and ping -I.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"syn-flood\"><strong>SYN Flood<\/strong><\/h3>\n\n\n\n<p>In a regular connection establishment, a client sends a synchronization packet to the server in 1<sup>st<\/sup>&nbsp;step, and in the 2nd&nbsp;step, the server responds with a sync-acknowledgment packet. When the host receives this packet, it replies back in the 3rd&nbsp;step with an ack. But in the case of a DDoS attack 3<sup>rd<\/sup>&nbsp;step is skipped by the host either using a spoofed IP address or using algorithms that help the attacker in not receiving the acknowledgments sent by the targeted host.<\/p>\n","protected":false},"excerpt":{"rendered":"DDoS stands for Distributed Denial of the Server, as its name indicates it. This is a service mitigation&hellip;","protected":false},"author":1,"featured_media":703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-702","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorized","8":"cs-entry"},"_links":{"self":[{"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/posts\/702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/comments?post=702"}],"version-history":[{"count":1,"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/posts\/702\/revisions"}],"predecessor-version":[{"id":19840,"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/posts\/702\/revisions\/19840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/media\/703"}],"wp:attachment":[{"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/media?parent=702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/categories?post=702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bisup.com\/blog\/wp-json\/wp\/v2\/tags?post=702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}