In a Distributed DoS (DDoS) attack, a hacker installs an agent or daemon on numerous compromised hosts. The hacker sends a command to the master, which also resides on a compromised host. The master communicates with the agents to commence the . . .
In a Distributed DoS (DDoS) attack, a hacker installs an agent or daemon on numerous compromised hosts. The hacker sends a command to the master, which also resides on a compromised host. The master communicates with the agents to commence the attack. (A good resource on DDoS attacks can be found in the March 2000 Network Defense column entitled "Distributed Denial of Service Attacks,".)

In this article, I'll look at DoS and DDoS attack methods, vulnerabilities, and potential solutions to these problems.

The link for this article located at Network Magazine is no longer available.