3.4. Distributed Denial of Service Attacks

DDoS attacks use a combination of the techniques described in this chapter to launch a large-scale attack against a network or network device. DDoS attacks are very effective in knocking their targets offline, because they are focused attacks that generally exploit a small number of weaknesses.

A DDoS attack is relatively simple: An attacker scans a series of network blocks looking for specific vulnerabilities. When a vulnerable host is found it is exploited and used to scan for other hosts with the same vulnerability or group of vulnerabilities. This creates a chain of computers that are under control of the attacker.

The tools used to launch DDoS attacks are automated: when the DDoS tool locates a ...

Get The Practice of Network Security: Deployment Strategies for Production Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.