All Documents
Current Document

Content is empty

If you don't find the content you expect, please try another search term

Documentation

Concepts

Last updated:2021-07-30 11:39:24

DDoS attack

A Distributed Denial-of-Service (DDoS) attack enables attackers to combine multiple hosts into an attack platform to launch DDoS attacks on one or more targets, thereby multiplying the power of DDoS attacks.

image.png

Attackers launch DDoS attacks automatically at low costs. However, defending against attacks requires huge investments. DDoS attacks are usually launched against specific targets, such as the payment page, login page, and homepage, causing severe damages. The gaming industry is most susceptible to DDoS attacks.

CC attack

A Challenge Collapsar (CC) attack is a type of DDoS attacks. CC attacks are mainly aimed at web pages. Attackers simulate multiple users by using proxy servers or zombie computers to access the pages and perform a large number of database query operations. These operations consume a lot of server resources and cause 100% CPU usage for a long time. As a result, the network is congested and normal access requests are suspended.

Differences between DDoS attacks and CC attacks

You can use physical firewall devices to filter DDoS attacks but not CC attacks because CC attacks are simulated normal requests. CC attacks are mainly aimed at web pages. Attackers control hosts and simulate users to access the pages that require a large number of data operations. These operations result in a huge waste of server resources.

On this page
Pure ModeNormal Mode

Pure Mode

Click to preview the document content in full screen
Feedback