In the Information security realm, there are different types of attacks occurring all over the world. There are virus attacks, phishing, worm attacks, DOS and DDoS attacks and others. In order to understand “Zombie systems”, we have to talk about DDoS(Distributed Denial of Service) attacks.
What are DDoS attacks?
Imagine a situation, when you are trying to shop on a website – but you are not able to access it. Even after repeated tries, the website is still unreachable. Why do you think this is so? One possible reason may be that the website may be under a DDoS attack.
What are DDoS attacks and what role do Zombie systems play in it – let’s read on…
When a server is inundated with useless requests, it wastes time tending to the countless useless requests and is not able to handle the genuine requests. The attacker controls an innocent computer to make the attack. This computer that is caught in the crossfire between the attacker and the server is the “zombie computer”. When the attacker controls a huge number of zombie computers to make the attack, the zombie computers are known as “Zombie systems”. The zombie systems do not know that they are under the control of the attacker. The attacker can also simultaneously control the zombie systems to launch the attack on the server.
Examples of DDoS attacks:
DDoS attacks unfortunately, are, very much a reality in today’s world. Let us see a few examples that occurred in 2016 and 2017.
Brian Krebs, the notable investigative reporter from krebsonsecurity.com,was targeted in 2016 and his site was subjected to a large DDoS attack of 620 Gbps(Giga bits of traffic per second!)
Github suffered the largest known DDoS attack on February 28,2018 for close to 10 minutes. The traffic peaked at 1.35 Tbps(Terabits per second) rendering the site unusable then.
We have seen the meaning of “Zombie systems” in relation to DDoS attacks.
This post is for alphabet ‘Z’ for the Blogchatter challenge… the previous alphabets are here…
Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.
She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂