Web Hosting Articles

  Home arrow Web Hosting Articles arrow Dealing With Distributed Denial of Ser...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Dealing With Distributed Denial of Service Attacks
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 3 stars3 stars3 stars3 stars3 stars / 7

    Table of Contents:
  • Dealing With Distributed Denial of Service Attacks
  • Types of Attacks
  • Preparing Your Defense
  • Working With Your ISP

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Dealing With Distributed Denial of Service Attacks

    (Page 1 of 4 )

    Distributed denial of service attacks are frustrating -- they're frustrating for the company under attack, and frustrating for the web host. They can also be costly in terms of business and goodwill lost. Fortunately, there are ways to deal with them, if you are willing to prepare for the possibility of a DDoS before it happens.

    You may not have seen them very much in the news recently, but distributed denial of service attacks (DDoS) have not gone away. If anything, these attacks – or at least their potential – have become scarier over time as malicious hackers have worked on improving their methods. The increase in home-based broadband Internet connections, for example, means that hackers can now more easily infect a larger number of machines with fast, powerful connections to the Internet and make them do their bidding.

    Let’s back up a second and define what we mean by a distributed denial of service attack. A DDoS attack is an attempt to disrupt the service of a computer network and/or company website by overwhelming the processing capacity of the system or by flooding the bandwidth of the business. It is a blatant attempt to consume the system’s resources, to the point that genuine, legitimate users (i.e. website visitors) are denied access.

    Hackers engage in DDoS attacks via a two-step process. First, they infect computers with viruses and Trojans that allow them to control the machines remotely. They will then use these computers, known as “zombies,” to overwhelm other systems. These zombie networks can become quite large.

    In October 2005, Dutch police arrested three people who’d created a zombie network comprising at least 100,000 computers. Some reports estimate the network was more like 1.5 million machines strong. The three who had created the network were using it to extort money from U.S. companies. It must have worked something like a high-tech version of the classic cliché of the mob protection racket: “Nice company website you have there. Be a shame if it crashed and all your customers couldn’t get through.”

    Since many commercial websites now rely on a constant Internet presence, this threat carries a real bite behind it. And with that many machines at a hacker’s command, even a hardened company such as Microsoft is not immune to a DDoS attack. It’s just the thing for the technology wizard with “different” morals who wants to make some money or a political statement.

    Dealing with the problems raised by DDoS attacks often requires lots of communication between the company being victimized and the ISP. If you’re hosting a website that is under attack, that’s you; if you’re a web hosting reseller, you’re still that company’s line of communication to the folks who are handling the servers. Needless to say, it helps to know what you’re up against.

    More Web Hosting Articles Articles
    More By Terri Wells


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap