In the Information security realm, there are different types of attacks occurring all over the world. There are virus attacks, phishing, worm attacks, DOS and DDoS attacks and others. In order to understand “Zombie systems”, we have to talk about DDoS(Distributed Denial of Service) attacks.
What are DDoS attacks?
Imagine a situation, when you are trying to shop on a website – but you are not able to access it. Even after repeated tries, the website is still unreachable. Why do you think this is so? One possible reason may be that the website may be under a DDoS attack.
What are DDoS attacks and what role do Zombie systems play in it – let’s read on…
When a server is inundated with useless requests, it wastes time tending to the countless useless requests and is not able to handle the genuine requests. The attacker controls an innocent computer to make the attack. This computer that is caught in the crossfire between the attacker and the server is the “zombie computer”. When the attacker controls a huge number of zombie computers to make the attack, the zombie computers are known as “Zombie systems”. The zombie systems do not know that they are under the control of the attacker. The attacker can also simultaneously control the zombie systems to launch the attack on the server.
Examples of DDoS attacks:
DDoS attacks unfortunately, are, very much a reality in today’s world. Let us see a few examples that occurred in 2016 and 2017.
Brian Krebs, the notable investigative reporter from krebsonsecurity.com,was targeted in 2016 and his site was subjected to a large DDoS attack of 620 Gbps(Giga bits of traffic per second!)
Github suffered the largest known DDoS attack on February 28,2018 for close to 10 minutes. The traffic peaked at 1.35 Tbps(Terabits per second) rendering the site unusable then.
We have seen the meaning of “Zombie systems” in relation to DDoS attacks.
This post is for alphabet ‘Z’ for the Blogchatter challenge… the previous alphabets are here…
- ‘A’ – Asset
- ‘B’ – What is Blockchain ?
- ‘C’ – Caesar cipher
- ‘D’ – Detroit
- ‘E’ – Empowering women
- ‘F’ – Four concepts of Blockchain
- ‘G’ – Go green
- ‘H’ – Hyperledger Composer
- ‘I’ – India
- ‘J’ – Java 101
- ‘K’ – Kulambu
- ‘L’ – List of Information security certifications
- ‘M’ – Michigan
- ‘N’ – NIST publications
- ‘O’ – Object oriented programming
- ‘P’ – Palm tree fruit
- ‘Q’ – Quiet
- ‘R’ – For the love of ‘Reading’….
- ‘S’ – Security
- ‘T’ – Time
- ‘U’ – Usage of Information security
- ‘V’ – VPN
- ‘W’ – Why do parents name their children after Gods?
- ‘X’ – XOR operator in Java
- ‘Y’ – Yoga – the panacea for all ills?
Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.
She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂