For the past few days, this web DigitalMoneyWorld.com has been under a denial-of-service attack (DOS attack). Its been slightly disruptive but the fine tech team at b5media (thanks Sean) has been effectively working to elude the attackers and things are settling down.
I’m told there were approximately 2000 hits a second for a few days. This kind of attack is typical of the HYIP operators and in my opinion came from the operators of the A3Union HYIP Ponzi Scam as I notice my Ponzi post appears in the number 8 position for Google keyword query A3union.
However, I had also just written a post on stolen credit cards being sold on the Net. Its worth noting that the focus of the credit card post was a discussion on the methods used to pay for the stolen merchandise so it can’t be said with 100% certainty who was responsible for the DOS attack. It could be a person or group that just does not like me, but that’s not narrowing the search much!
The web and the network survived and we will continue to blog through any future similar events.
What is a Denial-of-service attack?
A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for and targets of a DoS attack may vary, it generally comprises the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by:
- forcing the targeted computer(s) to reset, or consume its resources such that it can no longer provide its intended service; and/or,
- obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB’s Internet proper use policy. They also commonly constitute violations of the laws of individual nations.
No comments:
Post a Comment