Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    the ancient buddha statue for women is very beautiful but extremely vivid 119168

    Chilling Ancient Punishments for Women with Beautiful but Bloodied Names

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

  • Events
    • All
    • Science Stories
    • Scientific Projects

    Tonight announces the Ig Nobel Prize winners

    frog

    Frog Wins Ig Nobel Prize 2005

    canhcutIg

    Life is Not Lacking in Quirks

    Nobel Prize in Medicine 2005: A Modern Fairy Tale

    10 Weird Inventions Awarded the Ig Nobel Prize 2005

    nobelKT

    Why Did They Win the Nobel Prize in Economics?

    giaydientu

    “Electronic Paper” Set to Appear on the Market

    Development of Science and Technology in the South Central Coast and Central Highlands Provinces

    a russian scientist loves vietnam 1659

    A Russian Scientist Who Loves Vietnam

  • Lifestyle
    • All
    • Environment
    • Medicine & Health
    tdnong

    Global warming may be the cause of major storms

    traxanh1

    Green tea has effects against dementia

    Discovery of Cancer-Preventing Genes in the Human Body

    Khachdulich Indonesia

    Avian influenza harms tourism more than terrorism

    nao

    Lying – A Disease of People with Brain Defects

    cafe

    Coffee May Prevent Cancer

    tebaocum

    Recreating the ‘Death’ Flu Virus of 1918

    Indo ban

    The whole world unites to fight avian influenza

    HIV aids

    The Mystery of AIDS Epidemic

  • Technology
    • All
    • AI - Artificial Intelligence
    • Computer Science
    • New Technology
    • Scientific Inventions
    top apps explore space solar system on pc 98000

    Top Applications for Exploring the Universe and Solar System on PC

    vai dien tu 650

    Soon there will be data-transmitting clothing

    sua loi khong vao dc coc coc 650

    Why can’t Cốc Cốc download videos to the computer?

    may tinh cu 1

    17 Things You Can Do with an Old Computer

    play free games super fun on android devices 54708

    Play Extremely Fun Free Games on Android Devices

    top 10 best weather apps on android 98127

    Top 10 Best Astronomy Apps on Android

    how to charge iphone properly 122474

    How to Charge an iPhone the Right Way

    do not scan qr code finger 122198

    Don’t Scan QR Codes Randomly

    sensor technology for measuring oxygen in blood 120461

    Light-Emitting Sensor Technology Can Measure Blood Oxygen

  • Cultural Heritage
    ai cap 650

    The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

    khao co 650

    Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

    baroque churches philippines 67188

    Baroque Churches – Philippines

    mont saint michel france 67265

    Mont Saint Michel Island – France

    acropolis bracelet in athens greece 67621

    Acropolis Fortress in Athens – Greece

    language mo tan thuy hoang china 67087

    Tomb of Qin Shi Huang – China

    historical city ayutthaya 67804

    Historical City of Ayutthaya

    mesa verde national park 67201

    Mesa Verde National Park – United States of America

    to the taj mahal india 67153

    Taj Mahal Temple – India

  • Entertainment
    • All
    • Photo Library
    • Videos

    Honesty

    Telephone

    Advanced Technology

    Terminal Illness

    Allergy

    Love Like Mars

    Super Definition

    Coi Sách

    Selling Candy

No Result
View All Result
Scimyst
No Result
View All Result
Home Technology Computer Science

Cannot withstand denial-of-service attacks

by Sci
December 12, 2005
in Computer Science
0
Share on FacebookShare on Twitter

ddosRecent DDoS attacks on various business and organizational websites in Vietnam have left victims frustrated, as they find themselves unable to counter or trace the perpetrators. We spoke with Roberto Preatoni and Carole Theriault, two renowned international security experts, about this issue.

– When did DDoS attacks become a common attack method?

Roberto Preatoni is the founder of the renowned security forum Zone-H (http://www.zone-h.org/), known by the nickname SyS64738. He is also the CEO of Domina Security, a security systems company operating in several European countries. Preatoni is a respected speaker at many annual international security conferences such as Defcon (USA).

Roberto Preatoni: Since the late 1990s. This activity began when some security experts, while discovering vulnerabilities in the Windows 98 operating system, found that sending a large ping data packet could be enough to incapacitate a target server. This discovery was soon exploited by hackers to disable their intended targets. Thus, the primitive form of DoS (Denial of Service) was born. Meanwhile, DDoS (Distributed Denial of Service) relies on sending a ping command to a list of multiple servers (this method is called an amplifier, which amplifies the target bandwidth), disguising it as a ping packet so that the original IP address is masked with the victim’s target IP. When the servers respond to this ping request, they flood the victim with responses (called pong).

Carole Theriault is currently a senior security technology advisor at Sophos (UK). She is also a reputable consultant at various security forums and magazines worldwide.

Carole Theriault: DDoS originated from the primitive form of DoS. DoS is less dangerous because system administrators can often identify and block the troublesome host machine. In contrast, DDoS uses multiple distributed sources to coordinate attacks on the target. It is very difficult to identify which connections are legitimate and which are hostile.

– How is a typical DDoS attack initiated?

Carole1

Carole Theriault

Carole Theriault: An access request is sent to the server. The server authenticates and then waits for that command to confirm the aforementioned authentication before allowing the user’s computer to access it. In DDoS attacks, the server is overwhelmed by access requests from a massive number of connections originating from non-existent addresses, meaning the server cannot find legitimate users wanting to access. When the volume of access requests becomes too large, the server is flooded and cannot process the requests it is being asked to handle. Some types of viruses and malware have also caused DDoS attacks. The first cases were large-volume email viruses like Loveletter and Melissa, which flooded mail servers, preventing them from processing valid requests. Nowadays, many types of Internet worms exploit vulnerabilities in computers (for example, the Sasser virus in 2004) to flood Windows machines with flaws, preventing PCs from downloading patches.

Roberto Preatoni 1

Roberto Preatoni

Roberto Preatoni: Generally, attackers often take control of a computer remotely by exploiting some vulnerability. This computer (which later becomes part of the botnet used for DDoS attacks) will have a hidden process installed to ensure it remains connected in a secret chat room where the author gives it commands. This computer also scans the Internet for other vulnerable computers, infecting them with remote control software so that all newly compromised machines join the aforementioned chat room and are ready to receive commands from the hacker or continue searching for other faulty PCs on the Internet. Typically, within a few days, this botnet can grow from one to hundreds or thousands of members. Once this force is strong enough, they are used simultaneously to execute attack commands against the target at the author’s will. The target will disappear from the network, meaning it is completely offline. At the same time, all interactive activities of the victim on the Internet also stop.

– How many types of DDoS have been recorded to date?

Roberto Preatoni: In general, denial of service attacks can be grouped into several types: HTTP flood (web address attacks), Database flood (database attacks), TCP-IP protocol flood (TCP-IP protocol attacks), Bandwidth flood (bandwidth attacks), Mail bombing (email attacks), SMS bombing (SMS attacks).

Carole Theriault: Specific classification is very difficult. Some experts say there are three types. Many others believe there are up to twelve. The key characteristic of DDoS is to overload systems, paralyzing services and preventing us from processing legitimate transactions. Therefore, in my opinion, DDoS can be viewed in forms such as Internet Control Message Protocol (ICMP) attacks, flooding User Datagram Protocol (UDP), flooding Transmission Control Protocol (TCP), and application attacks through vulnerabilities…

– What is the general situation of DDoS on the Internet in recent years?

Roberto Preatoni: Denial of service attacks continue to increase and are becoming more common among younger hackers, who enjoy the thrill of conquest, and are also very popular in the cybercrime community, who relish the scent of money made from these activities.

Carole Theriault: Indeed, while some DDoS attacks are merely disruptive, many cases are extortion activities. As e-commerce grows, businesses increasingly rely on their websites, making them more susceptible to extortion whenever criminals attack their sites and demand payment. It is difficult to determine the extent of financial damage in this manner, as most victim businesses choose to pay and keep the matter quiet because they do not want to attract negative publicity. In the future, such attacks will continue as long as the potential for profit exists. Many well-known websites globally, such as those of Google and Microsoft, have been victims of DDoS attacks multiple times.

– So what should be done to counter DDoS?

Roberto Preatoni: You can only mitigate the intensity of the attack. There is no countermeasure unless your website is hosted on expensive and powerful systems like Akamai. Tightening database, application, and firewall management can help prevent many denial of service attacks, or at least reduce the impact on the website but not prevent destructive attacks.

Carole Theriault: It is essential to use a protected system, with applications regularly updated with patches, and to establish proper firewalls to filter data packets and prevent unauthorized third parties from accessing the system. Using updated antivirus software is also advisable.

When under attack, you can also increase bandwidth, although this is a very costly solution. In countries with developed IT infrastructure, there are many companies that offer this service in emergencies or during peak access hours when bandwidth needs to be enhanced.

Another measure is to set up a monitoring router on the network to detect before a data stream reaches the web servers of the website. This router will filter outgoing data packets and ensure that the source IP address of all those packets is balanced with the company’s IP address range and is not spoofed.

However, the best place to prevent denial of service attacks is not within the company’s network but at the ISP (Internet Service Provider). For example, they can limit the bandwidth of a specific data stream at any time. Unfortunately, not all ISPs engage in this practice. Perhaps it is best for businesses to discuss security website protection with their ISPs before signing contracts with them.

Phan Khương

Next Post
mozilla firefox 1 5 no error 2070

Mozilla: "Is Firefox 1.5 not buggy?"

4 great goals for e commerce development till 2010 2072

4 Major Goals for E-commerce Development by 2010

natural lure 2048

Nature's Hook

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

FEATURED POST

the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

space monsters in mythology first appearance 129358

Cosmic Monster ‘in Legend’ Appears for the First Time

the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

The world’s most dangerous strait – The haunting toll measured in sailors’ lives

10 amazing natural phenomena that challenge science 60818

23 Mysterious Natural Phenomena That Challenge Science

TRENDING

10 amazing natural phenomena that challenge science 60818
1001 Mysteries

23 Mysterious Natural Phenomena That Challenge Science

nguoi ai cap co dai 650
Scientific Discoveries

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

overcoming the bermuda triangle water absorbing 2 500 missing ships what is it 123256
Scientific Discoveries

Beyond the Bermuda Triangle, the lake that “swallowed” 2,500 ships: What is the secret?

no cave no peak excluding china leaves the world amazed when building a bridge like a dragon flying over the river 136956
Scientific Discoveries

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

EDITOR PICK'S

What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

No Tunnels, No Supports: China Stuns the World with a Bridge that Floats like Silk on the River

23 Mysterious Natural Phenomena That Challenge Science

17 Causes of Throat Tightness and Belching

Grand Canyon, the mysterious area containing ancient Egyptian relics of the United States

12 Most Dangerous Poisonous Mushrooms in the World

Records of the “Real” Dragons in History

Newsletter

THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

Subscribe to our mailing list to receives daily updates direct to your inbox!

Category

  • 1001 Mysteries
  • AI – Artificial Intelligence
  • Aliens & UFOs
  • Animal World
  • Antibiotic Resistance
  • Archaeology
  • Bacteria & Insects
  • Biology
  • Biotechnology
  • Climate & Weather

Site Link

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Scimyst - Your gateway to the wonders of science and culture

No Result
View All Result
  • Home
  • Discoveries
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
      • Bacteria & Insects
      • Biotechnology
      • Plants
    • Doomsday
    • Famous Landmarks
    • History
      • This Day in History
    • Military Science
    • Mars Exploration
    • Oceanography
    • Science Q&A
    • Science Quiz
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
      • Cultural Heritage
      • Vietnamese Heritage
  • Technology
    • AI – Artificial Intelligence
    • Computer Science
    • New Technology
      • Self-Driving Cars
    • Scientific Inventions
  • Lifestyle
    • Cancer
    • Environment
      • Climate & Weather
      • Disasters
      • Latest Storm Updates
      • Nature
      • Solutions
    • Medicine & Health
      • Antibiotic Resistance
      • Common Illnesses
      • Dengue Fever
      • Family Medicine Cabinet
      • Food Safety
      • Health
      • Influenza Outbreak
    • Scientific Applications
  • Events
    • Science Events
    • Science Stories
    • Scientific Projects
  • Entertainment
    • Photo Library
    • Videos

© 2025 Scimyst - Your gateway to the wonders of science and culture