{"id":13082,"date":"2024-08-27T18:54:22","date_gmt":"2024-08-27T18:54:22","guid":{"rendered":"http:\/\/127.0.0.1\/?p=13082"},"modified":"2024-08-27T18:54:23","modified_gmt":"2024-08-27T18:54:23","slug":"ghosting-bad-actors-to-prevent-dos-attacks","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/2024\/08\/27\/ghosting-bad-actors-to-prevent-dos-attacks\/","title":{"rendered":"\u201cGhosting\u201d Bad Actors to Prevent DoS Attacks"},"content":{"rendered":"\n

A denial of service (DoS) attack is a malicious attempt to bring down or disrupt a network, servers, or devices connected to the internet so legitimate users can\u2019t use its services. It\u2019s accomplished by crashing the server or flooding the target network with more traffic than it can handle.<\/p>\n\n\n\n

Crashing the server is made possible by the \u201creflex\u201d actions of the TCP\/IP protocol, where the server replies to communications that access it. For example, if a server receives a synchronization request (SYN flag) to open a communication, it will reply with an acknowledgement (ACK or SYN ACK flag) and prepares to start a session. When it receives the ACK flag, the bad actor knows it hit its target. Then it proceeds to send numerous SYN flags to create new sessions to use up the server\u2019s memory or CPU.<\/p>\n\n\n\n

That\u2019s an example of a SYN attack. There are also ACK attacks, RST attacks, FIN attacks, and combinations of the above and more, which can also crash the server.<\/p>\n\n\n\n

Then there are flood attacks. Once the bad actor knows the IP address of the target, they can overwhelm the network with more traffic than it can buffer, eventually causing it to stop.<\/p>\n\n\n\n

Then there\u2019s the Distributed Denial of Service (DDoS) attack, a variation of DoS attack where the bad actor organizes multiple signals from different IP addresses and locations to stop the services or flood the network. There are many more types of DoS attacks, limited only by the malicious actor\u2019s imagination.<\/p>\n\n\n\n

Each one of those attacks requires a different solution when you have a server that is exposed to the internet.<\/p>\n\n\n\n

What information does the bad actor need to conduct a DoS attack?<\/h3>\n\n\n\n

To carry out a DoS attack, the bad actor needs two things:<\/p>\n\n\n\n