Avicus Archive

DDoS. by hasl January 31, 2015 at 6:01 PM UTC

Hey!

Jack here, I am making this thread about DDoS. It is a commonly used threat on Minecraft, so I think it's time I make a post. Fully explaining what DDoS is, and how it works.

What is a DDoS Attack? A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information

Types of attacks? DDoS attacks come in many different forms, from Smurfs to Teardrops, to Pings of Death. Below are details about the types of attacks and amplification methods found on the map.

Attack Class: Four common categories of attacks.


TCP Connection Attacks - Occupying connections
These attempt to use up all the available connections to infrastructure devices such as load-balancers, firewalls and application servers. Even devices capable of maintaining state on millions of connections can be taken down by these attacks. Learn more...


Volumetric Attacks - Using up bandwidth
These attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion. Learn more...


Fragmentation Attacks - Pieces of packets
These send a flood of TCP or UDP fragments to a victim, overwhelming the victim's ability to re-assemble the streams and severely reducing performance. Learn more...


Application Attacks - Targeting applications
These attempt to overwhelm a specific aspect of an application or service and can be effective even with very few attacking machines generating a low traffic rate (making them difficult to detect and mitigate). Learn more...

Amplification: Two ways attacks can multiply traffic they can send.


DNS Reflection - Small request, big reply
By forging a victim's IP address, an attacker can send small requests to a DNS server and ask it to send the victim a large reply. This allows the attacker to have every request from its botnet amplified as much as 70x in size, making it much easier to overwhelm the target. Learn more...


Chargen Reflection - Steady streams of text
Most computers and internet connected printers support an outdated testing service called Chargen, which allows someone to ask a device to reply with a stream of random characters. Chargen can be used as a means for amplifying attacks similar to DNS attacks above Learn more...

__________________________________________________________________________________________

Building Capacity


Attackers build networks of infected computers, known as 'botnets', by spreading malicious software through emails, websites and social media. Once infected, these machines can be controlled remotely, without their owners' knowledge, and used like an army to launch an attack against any target. Some botnets are millions of machines strong.

Launching Attacks


Botnets can generate huge floods of traffic to overwhelm a target. These floods can be generated in multiple ways, such as sending more connection requests than a server can handle, or having computers send the victim huge amounts of random data to use up the target’s bandwidth. Some attacks are so big they can max out a country's international cable capacity.

Selling Silence


Specialised online marketplaces exist to buy and sell botnets or individual DDoS attacks. Using these underground markets, anyone can pay a nominal fee to silence websites they disagree with or disrupt an organisation’s online operations. A week-long DDoS attack, capable of taking a small organisation offline can cost as little as $150.

__________________________________________________________________________________________


~ $150
can buy a week-long DDoS attack on the black market.
~ More than 2000 daily DDoS Attacks are observed world-wide by Arbor Networks.
~ 1/3 of all downtime incidents are attributed to DDoS attacks.

__________________________________________________________________________________________


http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16465&view=map

Exploring the Data

The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known. Some features include:A video regarding DDoS can be found here: https://www.youtube.com/watch?v=NogCN78XN2w

DDoS is nasty, illegal stuff. Stay out of the way, and stay out of trouble. Threatening players in any way with DDoS is NOT accepted at Avicus and will result in a permanent infraction.

If you have any questions, worries or issues regarding DDoS, feel free to say here, and I will try to answer as best as I can.

All images, functions and facts belong to their truthful owners, I just did the finalising.

 

resepignev January 31, 2015 at 6:01 PM UTC

DDos threads aren't allowed on the forums/server/teamspeak.
And you are scamming. You didn't made this thread, you just copied from another website.

Atdit January 31, 2015 at 6:01 PM UTC

Haha I knew all of this shit before

Too bad it banned me...

TemporaryBan January 31, 2015 at 6:01 PM UTC

DDos threads aren't allowed on the forums/server/teamspeak.
And you are scamming. You didn't made this thread, you just copied from another website.
How is that scamming.. O.o

alexanderjoe January 31, 2015 at 6:01 PM UTC

DDos threads aren't allowed on the forums/server/teamspeak.
And you are scamming. You didn't made this thread, you just copied from another website.
Yes, but he never credited himself for making it.

resepignev January 31, 2015 at 6:01 PM UTC

How is that scamming.. O.o
He didn't wrote all this and doesn't give credit to the original website. And he said he made this post to explain DDosing.

Matic0B January 31, 2015 at 6:01 PM UTC

Yes, but he never credited himself for making it.
"Jack here, I am making"
"
it's time I make a post"

He also did not credit the original author that wrote it.

hasl January 31, 2015 at 6:01 PM UTC

All images, functions and facts belong to their truthful owners, I just did the finalising.

Newcleus January 31, 2015 at 6:01 PM UTC

Jack,
Next time you say you're going to make a thread like this, at least give credit to the person who made it instead of you making it. I'm sure the people from Digital Attack Map don't appreciate you taking their credit and hard work. If you want to make something like this, credit them or make your own instead of claiming their work, which is practically scamming.
Locking...