Nusuk Hajj platform offers 6 packages for foreign pilgrims    Expatriates' passport information can be updated through Absher for a fee of SR69    Hotel and Hospitality Expo expects 6,000 buyers at Saudi Arabia's largest industry gathering    Trump suspends global tariffs for 90 days, hikes China import tax to 125%    Virtual Branch enables HR Ministry to bring down in-person visits by 93%    Saudi Arabia announces 14 oil and gas discoveries in Eastern Province and Empty Quarter    Issuance of commercial registrations surge 48% by 154,000 in 1Q of 2025    Tourism Ministry announces 89% growth in licensed hospitality facilities in 2024    Dozens reportedly injured by Russian drone attacks across Ukraine    Sabiri strike gives Al Taawoun narrow first-leg win over Sharjah in ACL Two semi-final    Douglas Gauthier appointed CEO of the Royal Arts Complex in Riyadh's King Salman Park    King Abdulaziz Library unveils 400 rare Qur'an manuscripts    Faulty antenna played role in fatal Australian helicopter crash    Iran says it is ready for nuclear deal if US stops military threats    Nightclub collapse kills 79 in Dominican Republic's capital    Saudi Arabia ranked first globally in empowering women in AI    Woman becomes first in UK to give birth after womb transplant    Women make up 20% of e-sports players in Saudi Arabia    Pakistani star's Bollywood return excites fans and riles far right    Saudi U-17s qualify for 2025 FIFA World Cup after win over Thailand    Benzema rescues Al Ittihad with stoppage-time equalizer in thrilling Jeddah Derby    Veteran Bollywood actor Manoj Kumar dies at 87    Bollywood actress vindicated over boyfriend's death after media hounding    Grand Mufti rules against posting prayers and preaching in mosques on social media    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



How a denial-of-service cyber attack works
By Jordan Robertson
Published in The Saudi Gazette on 10 - 07 - 2009

INVESTIGATORS are piecing together details about one of the most aggressive computer attacks in recent memory — a powerful “denial-of-service” assault that overwhelmed computers at US and South Korean government agencies, companies and institutions, in some cases for days.
How does this type of cyber attack work? And how can people make sure their computers are safe?
Q: What is a “denial-of-service” attack?
A: Think about what would happen if you and all your friends called the same restaurant over and over and ordered things you didn't even really want. You'd jam the phone lines and overwhelm the kitchen to the point that it couldn't take any more new orders.
That's what happens to Web sites when criminals hit them with denial-of-service attacks. They're knocked offline by too many junk requests from computers controlled by the attackers.
The bad guys' main weapons in such an attack are “botnets,” or networks of “zombie” personal computers they've infected with a virus. The virus lets the criminals remotely control innocent people's machines, which are programmed to contact certain Web sites over and over until that overwhelms the servers that host the sites. The servers become too busy to respond to anything, and the Web site slows or stops working altogether.
Q: How often do these attacks happen?
A: People try denial-of-service attacks all the time — many government and private sites report being hit every day. Often the assaults are unsuccessful, because Web sites have ways of identifying and intercepting malicious traffic. However, sites really want to avoid blocking legitimate Web users, so more often than not, Internet traffic is let through until a problem is spotted.
Denial-of-service attacks are noisy by design, and they intend to make a statement. They're not subtle attempts to infiltrate a Web site's defenses, which can be much more insidious because that gives hackers access to whatever confidential information is stored there.
Often the attacks take a site out for a few hours, before Web site administrators can respond. What made the most recent attack notable is that it was widespread and went on for a while, beginning over the July Fourth holiday weekend and running into this week. It's not yet clear how the attack was able to last that long.
Q: Some organizations appear to have fended off these recent attacks, while other Web sites went down. How can this be?
A: The sites that went down probably were less prepared, because they are less accustomed to being hit or aren't sensitive enough to warrant extra precautions.
Popular Web sites, like e-commerce and banking sites, have a lot of experience dealing with denial-of-service attacks, and they have sophisticated software designed to identify malicious traffic. Often that's done by flagging suspicious traffic flowing into the site, and if there's enough of it, preventing it from ever reaching the site's servers.
Another approach is to flag suspicious individual machines that seem to be behind an attack, and ban any traffic from them from reaching the site.
That can often be difficult, though, because criminals use “proxy” computers to route their traffic, masking the source of the original requests. Proxy computers are often other infected computers that are part of a botnet.
Q: Is there usually evidence of who the culprits were? Or is the nature of the attack such that it leaves few fingerprints?
A: It's usually easier to stop a denial-of-service attack than it is to figure out who's behind it. Simply identifying where the malicious traffic is coming from won't get investigators very far, since the infected PCs that get roped into a botnet are owned by innocent people who don't know their computers are being used for nefarious purposes.
Pat Peterson, a security researcher and fellow at Cisco Systems Inc., says sophisticated attackers have also been adding a more subtle approach to evade detection.
Instead of directing huge amounts of traffic at a target site, they'll make more complicated requests one at a time that eat up more of the site's computing power, like trying to log in using bogus usernames and passwords.
If enough of those requests are made, on a site that requires a lot of computing power, the effect can be the same, and the site gets knocked out.
This type of attack is trickier because it doesn't involve the sort of massive traffic surge that would normally tip off network administrators.
This advanced tactic wasn't necessarily used in the most recent attacks. In fact there are signs the attacks were relatively amateurish.
The programming code appears to have been patched together largely from material that has been circulating in the criminal underground for several years, according to Jose Nazario, manager of security research for Arbor Networks.
Q: If these attacks make use of compromised computers corralled into a “botnet,” should I be worried about whether my PC is one of them? What could I do to prevent that or fix it?
A: If your computer is being used in a denial-of-service attack, you're likely to see a significant slowdown, because your processing power is being siphoned for the assault. But there aren't always obvious signs that your computer has been infected.
So the best thing is to focus on prevention, namely by having up-to-date antivirus software. In particular, make sure your antivirus software gets updated over the next few days. If you're concerned your machine might be infected, it's wise to run an antivirus scan. Many antivirus companies offer a free scan from their Web sites.


Clic here to read the story from its source.