

However, the replies of these computers will be sent to the victim’s website to overwhelm it with requests. Reflected Attack – A reflected attack is one where forged packets are set to numerous computers.This exhausts the server’s resources and finally forces it to go offline. SYN Flood – A SYN (synchronize) flood is an attack where repeated synchronize messages are sent to a server to initiate a connection that doesn’t close until timeout.

After that, the packets report back to their makers in the form of an ICMP packet. UDP Flood –A UDP (User Datagram Protocol) flood attack occurs when packets flood a host’s random ports to listen for applications there.However, there are different forms in which these attacks are made, including: This is usually conducted via internet connections and often targets a server hosting the website under attack. What is a DDoS Attack?Ī DDoS attack is an effort where several computers work together to overwhelm the computer processor of a victim and force it to crash. In order to continue maintaining your website’s online presence and your own peace of mind, read on and discover the basics of DDoS attacks. If you haven’t been briefed on this topic already, you’re one of the lucky few who DDoS attackers haven’t targeted yet. Whether you own a website, or a company, Distributed Denial of Service (DDoS) attacks is something you should know about. This is a guest post by Dmitri Blackthorn.
