It's often difficult for the attacked machine to distinguish between legitimate requests for service and the bogus request from the zombie machines.ĭOS attacks can also be carried out by disrupting configuration data such as routing information so that traffic to a server is re-routed, or simply sent nowhere instead of the server that users are trying to reach. Such tactics are sometimes referred to as distributed denial-of-service attacks because the computers used in the attacks are distributed all over the Internet. It would be like putting thousands of cars on the freeway, making it impossible for normal traffic or emergency vehicles to get through. These zombie machines can bombard a server with enough requests in a short period of time to simply overwhelm it. "Sometimes they're used to generate spam, sometimes to generate fake clicks on advertisements and sometimes they are told to simply flood a site with traffic," said Gibson.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |