Tuesday, August 7, 2012

[Hacking techniques and response] ① denial of service attacks




Use the Internet in all parts of life, and everything is changing fast. This points to the Internet using a variety of attack became so users will fall in trouble. But over the years, this technique is highly intelligent, can spread quickly throughout the world, so the security officer of each company to prepare exactly for this phenomenon was equipped with the knowledge you need to pay a little more effort is necessary.

Forward about six times, the most common hacking technique that is becoming an issue and let's learn how to respond.

A. Denial of service attacks (Denial of Service Attack)

Is one who drove the car even if you do not have the experience, as well as chultoegeungil without being blocked traffic in Seoul is the story everyone knows. One of the causes of these delays "bottleneck" can be explained by the word, this phenomenon leads to the world relentlessly for a lot of information and the Internet What is equally applicable in the transport sector.

1.25 In recent turmoil situation that serves as the address of the Internet DNS (Domain Name Server) can handle much more than the capacity to stop the service by being inundated with requests for one day does not have access to the Internet, who have experienced serious accidents have occurred . Fortunately, the damage to business hours on the weekend happened sagora individuals did not feel their own skin, but some significant disruption of service throughout the community alone had suffered much inconvenience.

Means a denial of service attack, the purpose of interfering with normal system service to send large amounts of data in the target network or system performance is rapidly degraded by the use of the services provided by the target system to prevent hacking attack technique of the most common is a way.

Internet users did not have much of an initial denial of service attacks that target a single system or service for an attacker to the victim's mainstay type was 1:01. In recent years, distributed denial of service attacks, but in the name of an unspecified system of N attempts to attack a single network that targets N: 1 is the type of mainstream.

These attacks take the pre-infected with an attack on an unspecified number of attempts and the resulting system of simultaneous attacks from the damage to a single system, as well as to paralyze the entire network can have a destructive power. N: 1 type of attack include the time-consuming manual methods mainly because the worm (Worm)
Such as automated attack tools are often used. Understand the nature of the attack tool, you also be arranged for this how to respond, because these research activities are also being actively investigated worldwide.

Technical countermeasures, as well as the most important thing is finding the symptoms in advance. These attacks use a large network because the network flow induced by the abnormal than in the early detection of signs, if this is possible for a fast response.

To this end, to establish basic security solutions, as well as the proper management and operations should be combined. Or incident response team that has a worldwide network, or security services to maintain a close relationship with specialist companies constantly updated by the security measures that will be more important than ever.

No comments:

Post a Comment