Questions tagged [ddos]

Distributed Denial Of Service (DDOS) is the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers (so-called zombies) which are used to stage DDOS attacks

Distributed Denial Of Service (DDOS) is the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers (so-called zombies) which are used to stage DDOS attacks

506 questions
80
votes
5 answers

How do major sites prevent DDoS?

As far as I know, I have never heard of or seen any large scale web sites like Amazon, Microsoft, Apple, Google, or Ebay ever suffer from DDoS. Have you? I have a personal philosophy that the bigger you are, the more of a target you are for such…
Lakitu
  • 931
  • 1
  • 8
  • 7
22
votes
3 answers

Since I can set the source IP address to anything using raw sockets, does this mean I am untraceable?

For homework, I coded a TCP packet with raw sockets. So I was also able to change the source IP address to whatever I wanted. So why can't someone just make a program, which sends millions of these packets (DDoS) with a different source IP address?…
Joey
  • 605
  • 8
  • 17
22
votes
2 answers

Does the amount of bandwidth available on a network determine how strong a DoS attack should be?

Does bandwidth alone determine how many packets a router or server can handle before the server is overran and then goes offline?
99Con
  • 427
  • 3
  • 9
20
votes
2 answers

Web Developer's responsibility for DDoS

If my website is targeted for a DDoS attack after I have been paid for completing the website, and I get an angry phone call from the client regarding outage of service, what do I do? It hasn't actually happened yet, but the idea haunts me.
Dmytro
  • 351
  • 1
  • 7
18
votes
4 answers

Accessing a site (which is) under a DDoS

Lets say http://www.an-example-site.com is under DDoS attack. Alice, who does not have direct access to the hardware infrastructure, urgently wants some information which can be accessed through the site only. In such a situation, what are the…
check123
  • 534
  • 1
  • 5
  • 14
13
votes
1 answer

Siri DDoS over FM Radio

A few days ago I was driving home and suddenly Siri started to talk by herself in reply to a command I never gave. As you can imagine I have the "hey siri..." feature active, so I can make calls without moving my hands from the wheel. I was…
AcidRod75
  • 243
  • 1
  • 5
8
votes
4 answers

Find out how my server is being used for DDOS attacks

I got an email from Amazon that my Amazon EC2 server is being used for DDoS attacks and they have closed all ports except SSH. This is tragical for me but I have not been able to find out how and where this attack is running. I can not find anything…
asle
  • 81
  • 1
  • 1
  • 2
8
votes
3 answers

When detecting a DDoS attack, do you just block that with your firewall or do you report it to the source providers?

We are receiving a large load of connections, over 10 million per day, over multiple ports (80, 443, 8080, 8888, and 4072). This has been going on for 4 days now and it does not look like it is going down. 99.9% of those are blocked at our firewall,…
Alexis Wilke
  • 1,007
  • 8
  • 25
7
votes
2 answers

Am I allowed to DDoS my own server?

I have bought a server and used it to host some game servers or my website. Now I am visiting a computer security course and I would like to test some of the presented attacks. Am I allowed to, for example, DDoS my own server, or could I damage…
Joey
  • 605
  • 8
  • 17
7
votes
3 answers

Can anyone DDOS my server with jmeter? Do they need a powerful server for that?

Is there a way to DDOS my web app through jMeter? Can anyone DDOS with a simple PC? I couldn't find any answer here. I would appreciate if anyone could help me out.
Alireza
  • 1,310
  • 1
  • 20
  • 26
7
votes
2 answers

Does a DDoS attack have other purposes beyond a lack of availability?

I'm currently researching DDoS attacks for an article I'm writing and apart from the obvious lack of availability of the target host and their services, is there anything else a DDoS can help accomplish? I'm thinking things along the lines of a DDoS…
Scott Helme
  • 3,228
  • 3
  • 23
  • 33
7
votes
4 answers

How is a ddos simulation any different from a real attack?

I asked a question earlier today on serverfault, but found out that there was also a security stack exchange. I had conflicting answers from there. The following is the…
Harry
  • 71
  • 3
6
votes
3 answers

DDoS attack - where are packets dropped?

I'm researching into ddos attacks to get a better understanding. I've read lots from this community however one thing I couldn't get my head around is packet dropping. So lets say I've identified an attack signature and want to drop these…
Sam M
  • 61
  • 2
6
votes
1 answer

How does an ISP combat Bandwidth Exhaustion / Volume DDoS?

While similar to this question, I'm asking in regards to a traditional ISP environment where you are running your own server center and firewall access lists. With a Bandwidth Exhaustion attack, the success of the attack is simply a measure of how…
700 Software
  • 13,997
  • 3
  • 55
  • 82
6
votes
3 answers

My server is used for DDoS attacks

I have webserver (centos + cpanel), and one of the clients used my server for DDoS-ing, how can I identify that client/user? What logs should I look to, is there any settings I can modify so such things can't happen again in future. Thanks
ProDraz
  • 165
  • 1
  • 5
1
2 3 4 5 6