What is Dos, DDoS and what is the difference between the two?

Sep 22 - 2023

DDoS

What is a DoS attack?

A DoS attack, also known as a denial of service attack, is literally a situation where a service is denied because of an attack, which is often accompanied by a large amount of traffic.

Traffic is when people request a certain website, and the website returns the data that people request accordingly, and this behavior produces a term that can be seen as traffic.

Beneficial traffic, not only we can help to improve people's search for the information they want,anti DDOS but also have a direct impact on the site itself or indirect benefits. But traffic is not always beneficial, in a DoS attack, a large amount of traffic to reach the site, the instantaneous pressure of the direct relationship can be crushed a normal website.

This kind of high traffic attack although you can also go to view or check, but often spend a long time, so by the time the webmaster or administrator realizes the problem is already too late.

The background of the emergence of DoS attacks?

The first DoS attack in history would have been in 1974.virtual Machine cloud The attacker was David Dennis, who was a 13-year-old student at the time. He stumbled upon a new command that could be run on CERL's Plato terminal.

Plato was one of the first computer shareware programs and a pioneer of multi-user computing systems.

The new command we mentioned above was called "external" or "ext", and it allowed interaction with external environmental devices connected to the terminal.

The peculiarity of this command was that when it was run on an external device terminal,vpshosting it caused the terminal to be locked and had to be restarted to be unlocked.

David Dennis was curious about the "landscape" if multiple users in the same server room (now it seems to be the same LAN) were locked out at the same time, and at a young age he didn't know what the consequences would be. So he wrote a program to send "ext" commands to several PLATO terminals at the same time. In the end, his program succeeded in shutting down the computers of 31 users on the same LAN.

This was the origin of the first DOS attack in history.

With the rise of IRC (Internet Relay Chat) in the 1990s, simple bandwidth-based DDoS attacks have become a tool to gain control of chat room administrators. With IRC, if the administrator logs out of his account, he loses his administrator privileges and the hacker takes control of the entire IRC channel to continue attacking other users.

This kind of network attack and now encountered in the enterprise DoS attacks produced by the consequences of the study although we are far from each other, but the root of their roots are their own same principle.

In 1999, a hacker successfully paralyzed the University of Minnesota's internal network for more than two days through a large-scale UDP attack, the first large-scale attack using a proprietary tool called Trinoo, and the first large-scale DDoS attack in history!

What is a DDoS attack?

A DDoS attack, also known as a Distributed Denial of Service attack, is distributed because the machines that perform the DoS attack are located in different places.

The following are the common characteristics of the websites that were attacked.

The website is slow to respond. The website is not responsive. When a user visits a website, they are unable to access it. There can be problems with the internet connection.DDoS attacks are a type of denial of service attack.

There is one, and surely themselves there are some other product types of DoS attacks: application layer flooding DoS attacks, unconscious DoS attacks. Of course, the main attack is still a DDoS attack, the following is a comparative analysis of DoS attacks and DDoS attacks.

The difference between DoS attacks and DDoS attacks?

1. Number of attack sources

DoS attacks have few sources, basically just a few IPs or a few IPs. DDoS attacks have many sources, all of which send a lot of traffic from different locations.

2.Execution method

DOS attacks are performed from a single system through scripts or DOS tools.DDoS attacks are a type of botnet that infects other machines with malware.

3. Attack Source Tracking

Due to the limited number of attack sources, DoS can be easily traced in a short or limited time.DDoS attack sources are huge and distributed in different places, which is difficult to trace.

By:Debbie