Hit-and-run DDoS

Hit-and-run DDoS is a type of denial-of-service (DDoS) attack that uses short bursts of high volume attacks in random intervals, spanning a time frame of days or weeks. The purpose of a hit-and-run DDoS is to prevent a user of a service from using that service by bringing down the host server.[1] This type of attack is to be distinguished from a persistent DDoS attack which continues until the attacker stops the attack or the host server is able to defend against it.[2]

Method of attack

A DDoS attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service.[3] A hit-and-run DDoS is accomplished by using high volume network or application attacks in short bursts. The attacks only last long enough to bring down the server hosting the service, normally 20 to 60 minutes. The attack is then repeated every 12 to 24 hours over a period of days or weeks, causing issues for the company hosting the service.

Hit-and-run DDoS is sometimes used as a test DDoS attack. An attacker will inject a few bad packets into a network to test if it is online and functioning. Once the network is verified as functioning, an attacker will then use a persistent DDoS attack.[4]

Hit-and-run DDoS exploits anti-DDoS software and services which are used to defend against prolonged DDoS attacks. Activating such software can take longer than the actual attack, allowing a denial of service before DDoS protection can start to defend from the attack.

gollark: ""moderator"", "hi".
gollark: The difference between complaining about *police* generally as opposed to people of some *race* is that police choose to be police. And probably do have more shared attributes, given that they all do the same job in similar institutions.
gollark: A lot of schooling is kind of terrible in my opinion. You're forced to learn stuff you may not actually care at all about, and often it's more "memorize these random things" than trying to develop actual understanding.
gollark: IPv6 best IP.
gollark: Cached? No.

See also

References

  1. EC-Council (2009). Computer Forensics: Investigating Network Intrusions and Cyber Crime. Cengage Learning. ISBN 9781435483521.
  2. Wiles, Jack; Reyes, Anthony (2011). The Best Damn Cybercrime and Digital Forensics Book Period. Syngress. p. 559. ISBN 978-0-08-055608-6.
  3. Richmond, Riva. "What 'DDoS' Attacks Are and How to Survive Them". Entrepreneur. Retrieved 28 January 2014.
  4. EC-Council (2009). Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems. Cengage Learning. p. 3. ISBN 1-4354-8364-2.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.