Cisco Cisco MGX-FRSM-HS2 B Serial Frame Service Module 白書
Strategies to Protect Against Distributed Denial of
Service (DDoS) Attacks
Service (DDoS) Attacks
Document ID: 13634
Contents
Introduction
Understanding the Basics of DDoS Attacks
Characteristics of Common Programs Used to Facilitate Attacks
Prevention
Capturing Evidence and Contacting Law Enforcement
Related Information
Understanding the Basics of DDoS Attacks
Characteristics of Common Programs Used to Facilitate Attacks
Prevention
Capturing Evidence and Contacting Law Enforcement
Related Information
Introduction
This white paper contains information in order to help you understand how Distributed Denial of Service
(DDoS) attacks are orchestrated, recognize programs used to facilitate DDoS attacks, apply measures to
prevent the attacks, gather forensic information if you suspect an attack, and learn more about host security.
(DDoS) attacks are orchestrated, recognize programs used to facilitate DDoS attacks, apply measures to
prevent the attacks, gather forensic information if you suspect an attack, and learn more about host security.
Understanding the Basics of DDoS Attacks
Refer to this illustration:
Behind a Client is a person that orchestrate an attack. A Handler is a compromised host with a special
program running on it. Each handler is capable of controlling multiple agents. An Agent is a compromised
host that runs a special program. Each agent is responsible for generating a stream of packets that is directed
toward the intended victim.
program running on it. Each handler is capable of controlling multiple agents. An Agent is a compromised
host that runs a special program. Each agent is responsible for generating a stream of packets that is directed
toward the intended victim.
Attackers have been known to use these four programs to launch DDoS attacks:
Trinoo
1.
TFN
2.
TFN2K
3.
Stacheldraht
4.