How to prevent DDOS attack LOIC

11:18 AM
How to prevent DDOS attack LOIC -

DDoS attacks are launched in line with "toolkit" specially designed to cause such attacks. One of the most well-known toolkit, a first version, was named after the ion cannon, imaginary weapon video game franchise known as Command & Conquer, the Loic (LOIC) is an open source network stress testing and application DDOS attack that is used by client machines to voluntarily botnet.

A distributed denial of service attack refers to a data traffic flow that a server receives when multiple systems send in the data with the purpose of its flood the bandwidth or resources. In most cases, this data stream is intended to stop receiving legitimate traffic from the server, 'service denying' to the clients sending requests to the server. To an end user, when a DDOS attack seems a service request delay, where new connections are no longer accepted.

LOIC has been responsible for several DDOS attacks on major websites such as PayPal, MasterCard and Visa, usually carried out by hacker groups like Anonymous. The LOIC application is available in two versions: the first is the binary version or the original instrument LOIC which was initially developed to highlight the test networks and web-based or JS LOIC LOIC.

The LOIC application, first developed by Praetox Technologies, send a large sequence of HTTP, UDP or TCP requests to the target server. LOIC is easy to use even by users who do not have basic skills of hacking. All you need is the target URL. To check the remote LOIC, hackers connect the client to launch an attack on a graphic Internet Relay using the IRC protocol.

Using this protocol, the user machine becomes part of a botnet. Botnets are networks of compromised computers systems that are controlled by an infection and that send a traffic flow to a target system when prompted.

The LOIC DDOS uses three types of attacks on the target machine. These include HTTP, UDP and TCP. These implement the same attachment mechanism, which is to open multiple connections to the target computer and send a continuous sequence of messages to the destination computer. The LOIC tool continues sending traffic to the target server, until the server is overloaded. As soon as the server can not respond to requests from legitimate users, effectively it closes down.

The JS LOIC released in December 2010 is a web based tool that runs on the web browser to enable JavaScript, hence the acronym JS. The LOIC sends an ID and message with a lot of connection requests per ID and message. LOIC DDoS attack tools make it easy to find the aggressor, and thus is not commonly used by ordinary customers. On the other hand, hackers with some skill can use the IRC network to launch the attack within a team that makes it difficult to identify the real people behind the attack.

The DDOS LOIC attack tool has been downloaded millions of times because it is simple to use and easy to identify. Network administrators can use an effective firewall to prevent or minimize the attack. Server administrators can then review the log to identify the IP traffic sent and block the IP from the server. well-written firewall rules can form a great filter from LOIC DDOS prevent attacks from being fully effective.

Some experts claim that filtering UDP and ICMP traffic can also deal with the LOIC attacks effectively. To be effective at the firewall, the rules must be implemented earlier in the network connection, for example at the ISP site manager, in which the server is connected to the backbone via a broadband line.

It 'also important to check the broadband line to make sure it has no limits. If the packets are delivered through a narrow bandwidth then clogging of this line you will still experience before any traffic can reach the firewall and get filtered.

LOIC DDOS attacks • can be mitigated by using two basic approaches, a signature or heuristic control. Signature test using predetermined filter patterns corresponding inbound traffic patterns and eliminate the attack. Although effective for repeat attacks, it becomes a problem when new models are launched attacks, and will continue to be a problem until the signatures are updated.

On the other hand attack DDOS heuristic control systems make "educated guesses" of imminent attacks and acts to eliminate or minimize the effects.

versions based on trial and error Normally, these methods provide ++ approximation solutions that require the speed of DDOS attacks Prevent •. heuristic signatures can then provide a real-time approach to the problem. Other proprietary technology may include a human-computer interaction by providing a user interface, allowing the system administrator to receive when they are detected heuristic signatures.

Previous
Next Post »

2 comments

  1. Urgently want order ddos to site? I recommend this service!

    ReplyDelete
  2. Do you want dbuy ddos but do not know where to do it? This service will help you to do ddos attack.

    ReplyDelete