1. Home > Web_defense >

Video demonstration of the scenario when the server was attacked by hackers DDoS


Because the Taiwanese fishermen were killed by the Philippines recently, hackers in Taiwan and the Philippines Both began to attack each other's government websites. DDoS attacks are indispensable among these attack methods, but this article is not about what is happening right now. There should be many people who have used VLC video player, a good software, and it was the company that developed this software that suffered a DDoS attack not long ago.

   first explain what is DDoS attack. Explanation on Wikipedia:

Distributed Denial of Service (English: Distributed Denial of Service, abbreviation: DDoS) is also known as flood attack. As the name implies, it uses compromised computers on the network as "zombies" to launch intensive "denial of service" attacks on a specific target computer to exhaust the network resources and system resources of the target computer, causing It is unable to provide services to users who really normally request. Hackers can launch large-scale DDoS or SYN flood network attacks by forming “zombies” or “broilers” into a botnet, or group “zombies” together for profitable website traffic and email spam Mass mailing, paralyzing the intended target, being hired to attack competitors and other commercial activities.

according to According to Ludovic Fauvet, an employee of VideoLan, the server where get.videolan.org was located was receiving 400 download requests per second—a total of nearly 60GB of downloads per second. What is this concept? You can see by comparison. The large-scale DDoS attack that dragged Wikipedia down before was about 10GB per second.

Thanks to VLC video player The security employees of the development company, because of them, we now have the opportunity to see what a DDoS attack looks like. Here is what the record of the attacked side looks like:

The security software quickly recognized that this was an attack. Fauvet and his colleagues quickly blocked the hacker’s access.

By identifying some After similar user characteristics, they adjusted the Nginx server configuration so that their request connections were ignored. As a result, these DDoS attack requests caused no impact except for an HTTP 403 error.

This article is published by www.internetweblist.com and does not represent the position of www.internetweblist.com/:http://www.internetweblist.com/Web_defense/28671.html

Contact Us

Online consultation:click here to give a message