In a Distributed Denial-of-Service (DDoS) attack, a hacker tries to flood the targeted machine with requests until all the resources are used up and the service becomes unavailable. The attack is made more effective when multiple compromised computer systems carry out the attacks.
Before a DDoS attack can be carried out, the hacker needs to gain access to multiple computers. This can be achieved by installing malware on the victim’s computer. This malware turns each machine into a bot, which gives the hacker control over the
Many attacks have occurred over the years, like:
Use anti-DDoS Softwares to help distinguish between legitimate traffic and bogus traffic.
Disperse traffic amongst servers to help make attacks ineffective. More capacity requires the hacker to have more resources, so the chances of a DoS attack are reduced.
Configuring firewalls and routers can filter out unwanted traffic.
In case of excessive traffic, make use of black hole routing, which redirects traffic to a null route and prevents the targeted machine from being overwhelmed and the services from crashing.
The server can make use of rate limitation to limit the number of requests that it receives within a given time. This prevents the server from crashing.
Free Resources