DDOS stands for Distributed Denial of Service, DDOS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.
Basically DDOS is the attack where an attacker sends unwanted or non-relevant traffic to your website server.
There are 3 types of DDoS Attacks:
- Volume-based attacks
- Protocol attacks
- Application layer attacks
How DDOS Attack Works
A DDOS can be performed by an attacker were attacker is trying to get control on computer and other internet devices(IoT) and convert them into a bot The attacker then has remote control over the group of bots, which is called a botnet.
when every botnet has been established then the attacker is able to send commands to every botnet When the IP address of a victim is targeted by the botnet, each bot will respond by sending requests to the target, potentially causing the targeted server or network to overflow capacity, resulting in a denial of service to normal traffic. Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.
Recent DDOS Attack
- GitHub (February, 2018) A popular online code management service used by millions of developers, GitHub is used to high traffic and usage.
- Dyn (October, 2016)
- BBC (December, 2015)
- Spamhaus (March, 2013)
- Bank of America/JP Morgan Chase/US Bancorp/Citigroup/PNC Bank (December, 2012)
- Tor’s Hammer
The list of tools mentioned in this article is the most popular one for making a DDoS attack. These tools can be great resources for performance and security testing.
To conclude, HULK will be a good tool for research purposes. LOIC and XOIC are easy to use. LOIC can be used for testing. RUDY and PyLoris are also created especially for testing purposes.