The topic of this article may not meet Misplaced Pages's notability guideline for neologisms. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted. Find sources: "Hit-and-run DDoS" – news · newspapers · books · scholar · JSTOR (August 2014) (Learn how and when to remove this message) |
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Hit-and-run DDoS" – news · newspapers · books · scholar · JSTOR (August 2014) (Learn how and when to remove this message) |
Hit-and-run DDoS is a type of denial-of-service (DDoS) attack that uses short bursts of high volume attacks in random intervals, spanning a time frame of days or weeks. The purpose of a hit-and-run DDoS is to prevent a user of a service from using that service by bringing down the host server. This type of attack is to be distinguished from a persistent DDoS attack which continues until the attacker stops the attack or the host server is able to defend against it.
Method of attack
A DDoS attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. A hit-and-run DDoS is accomplished by using high volume network or application attacks in short bursts. The attacks only last long enough to bring down the server hosting the service, normally 20 to 60 minutes. The attack is then repeated every 12 to 24 hours over a period of days or weeks, causing issues for the company hosting the service.
Hit-and-run DDoS is sometimes used as a test DDoS attack. An attacker will inject a few bad packets into a network to test if it is online and functioning. Once the network is verified as functioning, an attacker will then use a persistent DDoS attack.
Hit-and-run DDoS exploits anti-DDoS software and services which are used to defend against prolonged DDoS attacks. Activating such software can take longer than the actual attack, allowing a denial of service before DDoS protection can start to defend from the attack.
See also
References
- EC-Council (2009). Computer Forensics: Investigating Network Intrusions and Cyber Crime. Cengage Learning. ISBN 9781435483521.
- Wiles, Jack; Reyes, Anthony (2011). The Best Damn Cybercrime and Digital Forensics Book Period. Syngress. p. 559. ISBN 978-0-08-055608-6.
- Richmond, Riva. "What 'DDoS' Attacks Are and How to Survive Them". Entrepreneur. Retrieved 28 January 2014.
- EC-Council (2009). Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems. Cengage Learning. p. 3. ISBN 978-1-4354-8364-4.