Two days ago, can't read music videos that users do not feel strange, DDOS attacks as music videos, but also up to 200G attack. This high frequency, high flow attack must belong to the premeditated malicious attacks and DDOS attack is a "wounded enemy 1000, since the loss of 800" means of attack, the attacker the means test is enormous. The attack lasted for about a day, has been reported to the public security organs.
This music video also released an official statement, saying:
"Innovation will inevitably bring about pain, but the user is innocent while innovation will eventually usher in Chaoyang, a malicious hidden only before dawn."
As this seems, DDOS attacks seem to be intentional. Like media, portal type sites and video sites, it's easy being black, DDos attacks, and this is there are two other reasons:
First, in order to compete, the second is for profit.
Most attack sites are competing or initiated by other interests, music videos that the cause of the attack was not ruled out. Star Wars R2D2 iPhone 6 case
This event can be seen from, your Web site must always be prepared anti-DDOS-proof. DDoS attacks at present there are two main types-bandwidth exhaustion attacks and resource exhaustion attack, in order to prevent both of these types of attacks, you can do the necessary work.
Determine the source of the attack; R2D2 iPhone
Monitor incoming network traffic;
Ability to optimize the use of resources and enhance network load on your server;
Using a highly scalable DNS device;
Router or firewall against IP spoofing feature is enabled;
Listen to expert opinion.
DDOS attack known as distributed denial of service attack, the attacker with client/server technology, multiple computers together as an attack platform, DDoS attacks against one or more targets, and exponentially increase the power of denial of service attacks, most basic DDOS attacks is to use reasonable service requests to excessive service resource, the response so that legitimate users cannot receive service.
Due to a DDOS attack by a large number of legitimate requests to consume large amounts of network resources to achieve paralysed the network, and therefore more difficult to find sources, also became paralyzed rival networks one of the most common ways of many competitors.
No comments:
Post a Comment