Surely all of us have now heard terms such as bot-net, malware, computer viruses, etc. We at iguru ook a few times have written articles on ways to prevent, or even category analyzes and more specialized ways to deal with computer threats.
Αυτό το άρθρο είναι αφιερωμένο σε μια συγκεκριμένη τακτική χάκινγκ που την ακούμε συνέχεια από τον περασμένο Σεπτέμβριο και δυστυχώς θα συνεχίσουμε να την ακούμε και στο μέλλον. Η τακτική αυτή είναι γνωστή σαν επίθεση Dos ή DDos και ο μέσος χρήστης δεν μπορεί να την αντιμετωπίσει με antivirus most..
What is Dos and what DDos?
In a DoS attack, the attacker causes the IP address of the target device to be congested, with external, unnecessary communication requests constantly sending requests from the attacker to the server to keep it busy, making it impossible or time consuming to connect the device to the Internet. The attack is directed at the IP address of the target device.
The above can be done very easily from any terminal.
In contrast, in a DDoS attack, the attacker uses malicious software installed on multiple computers to detect and attack the target device. Invaders launching a DDoS attack choose this type of attack to get a bigger hit on the target device than a DoS attack that starts with a single device.
How can I know if I'm attacking?
If your device is being attacked by DoS or DDoS, you may not be able to connect to the Internet or the device being attacked will be disconnected. The goal in a few words of this particular way of attack is blackout.
What is the IoT we are listening to over the last few months and what role does it play in DDos attacks?
Internet of Things (IoT), is a new term coined with Kevin Ashton, co-founder and executive director of the Auto-ID Center (an MIT research consortium), during presentationof Procter & Gamble. As "things" he referred to the objects that are now able to connect and share data via a network, whether they are sports shoes that measure time and steps, whether they are decoders, routers, or medicine boxes that remind patients to take their medicine, etc.
In the vision of the Internet of Things, objects create a diffuse system and are interconnected using multiple (usually small) communication technologies. RFID tags are one of the first examples in this field. However, over time, this has led to new technologies that make communication between objects more efficient. The IEEE 802.15.4 standard stands out among them and the recent modification of IEEE 802.15.4e can significantly increase the reliability of radio frequency connections and energy efficiency, thanks to the adoption of the mechanism accesss.
Mirai malware.
"Mirai” which means “the future” in Japanese, is the name given to malware specifically designed to infect Appliances IoT, which last September 20 took part in one of the biggest DDos attacks ever. Some of the targets were Twitter, GitHub, Reddit, Netflix, Airbnb and many others such as the French provider OVH. And also a configuration of this particular malware was yesterday's almost successful attack on Deutsche Telecom.
Malware was designed to infect Linux systems and synchronize the attack.
Finally is open source safe?
One of the questions that immediately comes to my mind is the following .. We keep hearing about the security provided by Linux with its Kernel and surely anyone who frequents online forums for Linux fans will have read at least once the attack " Linux has no viruses ”! The above confirms my view that "no one deals with Linux" and if he decides to deal with it, here are the results. And Linux is not just Ubuntu! Linux also runs the router we are currently connecting to the internet from our home!
The bad thing is that each of us with basic knowledge can find the source code, configure it, adapt it to a device and here is an IoT! A smart toaster, for example, that can remind you of your tithe with a message on your mobile phone! If I can synchronize a large number of such toasters to transmit data at the same time, I can create big problems for an entire country! Straight out of a movie right? And yet we already experienced it!
Do we need to set some security terms and protocols to use open source?