Inform/Distributed Denial of Service: Difference between revisions

no edit summary
No edit summary
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 11: Line 11:
===Explanation===
===Explanation===


{{sidenote|The Explanation section gives more detail, with diagrams and metaphors. It addresses common misconceptions. The inline links, explaining technical terms, would be to other ISPM pages.}}
{{sidenote|The Explanation section gives more detail, with diagrams and metaphors. It addresses common misconceptions. The inline links, explaining technical terms, would be to other Inform pages.}}


[[File:Ddos-before.png|400px|thumb|right|Normal operation]]
[[File:Ddos-before.png|400px|thumb|right|Normal operation]]
Line 26: Line 26:
Because the attacker is often anonymous and can be controlling the DDoS from anywhere in the world, legal action is unlikely to be effective against such an attack. The best mitigations are well-designed servers, hardware firewalls, competent technical staff, and a capable and responsive web hosting service and ISP.
Because the attacker is often anonymous and can be controlling the DDoS from anywhere in the world, legal action is unlikely to be effective against such an attack. The best mitigations are well-designed servers, hardware firewalls, competent technical staff, and a capable and responsive web hosting service and ISP.


==Resources==
==Further Reading and Resources==


{{sidenote|The Resources section lists further reading, and links to presentation slides, images, videos or other useful explanatory content.}}
{{sidenote|The Further Reading and Resources section gives links to presentation slides, images, videos or other useful explanatory content.}}


* [[Media:ddos.odg|OpenDocument Graphics file of diagrams on this page]]
* [[Media:ddos.odg|OpenDocument Graphics file of diagrams on this page]]
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service attack] on Wikipedia
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service attack] on Wikipedia
Account confirmers, Anti-spam team, Confirmed users, Bureaucrats and Sysops emeriti
4,925

edits