Today I will discuss:1. WHAT IS A DDOS ATTACK?2. How To Mitigate DDoS Attacks?Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm--📌📌📌WHAT IS A DDOS ATTACK?A DoS Attack (Denial Of Service) is basically a malicious attempted made by threat-actors to attack the 'Availability' of a targeted system, to its legitimate end-users. These targeted systems can be a website or a web-based application. In this attacks, hackers typically generate a large volume of data-packets or requests with the intention of overwhelming the targeted system.A DDoS attack is very much similar to DoS attack, except that attackers uses multiple compromised or controlled sources to generate the huge volumes of these requests or data-packets.DDoS attackers accomplish this by coordinating an army of compromised machines, or 'bots'. These botnets may carry out DDoS attacks with a range of malicious techniques such as:• Exhausting your bandwidth with massive volumes of traffic• Filling up your system resources with half-open connection requests• Crashing web application servers with voluminous requests for random informationA METHOD TO THE MADNESSIn general, DDoS attacks can be segregated by which layer of the OSI model they attack. They are most common at the Network (Layer 3), Transport (Layer 4), Presentation (Layer 6) and Application (Layer 7) Layers. For example,✅ UDP reflection attacks target the Network (Layer 3)✅ SYN floods target the Transport (Layer 4)✅ SSL abuse targets the Presentation (Layer 6)✅ HTTP floods, DNS query floods target the Application (Layer 7) It is the practice of either blocking or absorbing malicious spikes in network traffic and application usage caused by DDoS attacks, while still allowing legitimate traffic to flow uninterrupted._
Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm
How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯
https://www.youtube.com/watch?v=84gNIEmCEAA
If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.
Thanks,
Meena R.
Your 'Cyber Warrior' Friend
_
YOU CAN FOLLOW ME AT:
Facebook Page : https://www.facebook.com/cybersec.prism
Instagram: https://www.instagram.com/meena.cyber.warrior/
Linkedin Profile: https://www.linkedin.com/in/meena1/
About ME: https://www.youtube.com/watch?v=T66K3K5Y2tI
YouTube Channel: https://www.youtube.com/@cybersecurityforever8214
Hear My Podcast: https://anchor.fm/meena-r
Linkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/
Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/
**
Here are more resources:
**
-
Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)
_
https://luminisindia.com/cybersecurity-prism
_
You can also watch 👀 all the videos ofCybersecurity Series there:
_
Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/
YouTube : https://www.youtube.com/@cybersecurityforever8214
_
Gateway ⛩ to Cybersecurity
--
https://luminisindia.com/goehm
_
The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster...
_
✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh
_
Are you willing to learn Networking now?
Would you like to watch some videos of Networking, CCNARouting & Switching, etc?
_
https://luminisindia.com/networking-free
_
❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓
--
https://luminisindia.com/free-ccna-security-presentations
_