Wednesday, December 31, 2014

How DDOS Attacks Work & Why They're Hard to Prevent

"For example: the High Orbit Ion Cannon (HOIC), a free piece of software that allows anyone to flood a website with overwhelming amounts of dummy traffic created by custom scripts. Anyone with a computer can download this program, type in the URL of a website, and watch the HOIC generate fake user after fake user in hopes of overloading that site's servers and bringing it down. And when multiple people use the HOIC at once on the same target, the damage can grow exponentially higher.

Taking on a multi-billion-dollar corporation like Sony requires more sophisticated methods, though. David Larson, CTO of the cybersecurity firm Corero Network Security, said he suspects that this PSN attack was the result of some sort of combination of DDoS tools that may have included botnets—collections of computer servers designed to connect and perform a unified action. Anyone can rent a botnet, Larson said—and combining botnets and Ion Cannon-like flooding programs can cause a lot of devastation across the web."


  1. DDoS attacks are a fairly common occurrence on the internet. For more info about DDoS Protection visit

  2. DDoS attacks continue to be one of the most targeted attack vectors to counter. The range of attack methods is growing and diversifying as a prebuilt toolkit, and even DDoS attack services, are made more readily available. To learn more about DDoS Mitigation Solution visit


Search This Blog