Last updated:2021-07-30 11:39:24

DDoS attack

A Distributed Denial-of-Service (DDoS) attack enables attackers to combine multiple hosts into an attack platform to launch DDoS attacks on one or more targets, thereby multiplying the power of DDoS attacks.


Attackers launch DDoS attacks automatically at low costs. However, defending against attacks requires huge investments. DDoS attacks are usually launched against specific targets, such as the payment page, login page, and homepage, causing severe damages. The gaming industry is most susceptible to DDoS attacks.

CC attack

A Challenge Collapsar (CC) attack is a type of DDoS attacks. CC attacks are mainly aimed at web pages. Attackers simulate multiple users by using proxy servers or zombie computers to access the pages and perform a large number of database query operations. These operations consume a lot of server resources and cause 100% CPU usage for a long time. As a result, the network is congested and normal access requests are suspended.

Differences between DDoS attacks and CC attacks

You can use physical firewall devices to filter DDoS attacks but not CC attacks because CC attacks are simulated normal requests. CC attacks are mainly aimed at web pages. Attackers control hosts and simulate users to access the pages that require a large number of data operations. These operations result in a huge waste of server resources.

Did you find the above information helpful?

Mostly Unhelpful
A little helpful
Very helpful

What might be the problems?

Unclear or awkward
Redundant or clumsy
Lack of context for the complex system or functionality

More suggestions


Please give us your feedback.


Thank you for your feedback.