Adding to the chaos is the fact that the zombie computers often show no signs of being infected. Hackers look for computers with security vulnerabilities and infect them in advance of an attack. When the hackers are ready to launch the assault, the master computer awakens its zombie army, and the attack begins. Because DDoS utilizes multiple computers from multiple locations — and because hackers may use their network for only a single attack — there's no way to protect against a seemingly random array of computers suddenly going rogue. Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process. Internet service providers say they're rarely able to identify the master computer behind a DDoS attack.
This method of causing computer chaos has been used at least as far back as 1998, when the first software tools were developed to assist in DDoS assaults. But the attacks didn't garner much attention until 2000, when Amazon, eBay, Yahoo! and CNN were brought down in a single week by a Canadian teenager. They've been a scourge ever since and have even been employed in cyberwarfare. During the war between Russia and Georgia last year, hackers brought down several Georgian websites using a DDoS attack. And in the aftermath of Iran's tumultuous election in June, several international computer networks were trained to take down sites belonging to President Mahmoud Ahmadinejad.
While some Facebook services were unavailable early Aug. 6, Facebook officials said it wasn't immediately clear if it was related to the Twitter attack
No comments:
Post a Comment