Originally posted by: bsr
just rapid packets (requests), typically sent from multiple machines in which would kill network bandwidth. In many cases it is a virus that causes it....
DDOS - Distributed Denial of Service
It's amazing how many people forget about the latter. 🙂Originally posted by: spidey07
1) So much traffic that bandwidth is saturated with the attack and not much else can get through
2) Service based attack where the host or hosts run out of resources (like tcp connections, memory, processor, etc) because they are doing nothing but servicing the attack.
Originally posted by: spidey07
heh,
I remember when I accidentally DDoS our own mail servers years ago.
I miswrote an access list that denied any reply traffic from the mail servers to clients. Not really a big deal except for now 30,000 clients were not receiving the syn-ack (2nd packet of tcp handshake) reply from the server.
Affect was clients continually tried to reconnect and the server ran out of TCP connections
-edit- for the truly geeky folks....the RPF check is critical with multicast routes and one of the reasons why properly designing multicast networks is so difficult. To much redundancy will reak havoc on the mcast routes because of a RPF problem. I learned that one the hard way.
Against a raw bandwidth flood attack, you can't. It's simple math. If you have a 1.5mbps connection and they are sending 1.5mbps worth of traffic, you have 0 available for your usage.Originally posted by: groovin
now my question: how do you defend against such an attack?
Also, source address spoofing is something I've always thought EVERY ISP should implement at their border routers.