DDOS
DDOS
DDOS
ICMP flood
An ICMP flood attack is used to take unconfigured or misconfigured network devices and uses
them to send spoof packets to ping every computer within the target network.
SYN flood
SYN flood attacks send requests to connect to a server but don’t complete the handshake. This attack is
preventing anyone from connecting to the network when the network becomes inundated with connection
requests.
Teardrop Attack
An attacker sends IP data packet fragments to a network that will attempt to recompile these fragments into their
original packets. The recompiling process will exhaust the system until it ends up crashing. It crashes because the
fields are designed to confuse the system so that it can not put them back together.
SOLUTION
To protect against DDoS attacks, businesses and individual website owners
can use specialized services. Some of the best solutions are listed below. :
• Cloudflare
• Incapsula
• Akamai
• AWS Shield
• BeeThink Anti-DDoS Guardian
• Sucuri
• Cloudbric
• Alibaba
• F5
• Radware DefensePro
CONCLUSION
In conclusion, DoS and DDoS are malicious attempts to make
a network or website unavailable to its intended users. These
attacks can have a significant impact on the availability and
functionality of targeted systems and can result in significant
financial losses and reputational damage. It is important to
take steps to protect against these types of attacks, such as
implementing firewalls, intrusion detection systems and
intrusion prevention systems, as well as using services such
as cloud-based DDoS protection. It is highly recommended to
stay informed and updated with the latest trends and best
practices to effectively defend against these types of attacks.
THANK YOU
Semoga hari anda dipenuhi senyum tawa manis , bukan sedih yang
membunuh hati <3