What-Is-A-Dos-Attack-Featured-Image

What is a DoS attack?

April 21, 2022 written by 01NODE

DoS attack (or Denial-of-Service attack) is a method used to disrupt legitimate users’ access to a target network or web resource. Typically, this is accomplished by overloading the target (often a web server) with a massive amount of traffic – or by sending malicious requests that cause the target resource to malfunction or crash entirely.

The first documented case of a Denial-of-Service attack was in February of 2000 when a 15-year old Canadian hacker targeted Amazon and eBay web servers with such an attack. Since then, more and more people have utilized DoS attacks to disrupt targets in many industries.

Types of DoS attacks

01-What-Is-A-Dos-Attack

Some types of Denial-of-Service attacks aim to disrupt a specific target individual’s access to a network or resource, while others intend to render the resource entirely inaccessible. These attacks can last anywhere from minutes to hours, and in some rare instances, even for days. These types of outages often cause major financial losses for businesses that become targets and don’t have the proper mitigation strategies in place.

Denial-of-Service attacks come in many different shapes and sizes. Since not all devices and networks are vulnerable in the same ways, those trying to cause harm often have to get creative in the ways they can exploit loopholes. Following are some well-known types of Denial-of-Service exploits.

Buffer overflow attack

A buffer overflow attack is likely the most common type of exploit. It relies on sending more traffic to the target than developers had originally built the system to handle. This type of attack allows the bad actor to crash or even interfere with the targeted process.

ICMP flood

An ICMP flood attack targets a misconfigured device on the target network, forcing the machine to distribute bogus packets to each and every node (computer) on the target network instead of a single node, thus overloading the network. This sort of attack may often be referred to as “the ping of death” or a “smurf attack”.

Can DDoS attacks affect cryptocurrencies?

02-What-Is-A-Dos-Attack

In a majority of cases, Denial-of-Service attacks have been used to target web servers of large corporations, such as banks, online commercial retailers, and even major government and public services – however, it’s important to consider that any device, server, or network connected to the internet could be a potential target for these types of attacks.

As cryptocurrencies have picked up traction in recent years, crypto exchanges have become increasingly popular targets for DDoS attacks. For example, when the cryptocurrency Bitcoin Gold officially launched, it immediately became the target of a massive DDoS attack that ended up disrupting their website for multiple hours.

However, the decentralized aspect of blockchains creates strong protection against DDoS and other cyber attacks. Even if several nodes fail to communicate or simply go offline, the blockchain is able to continue operating and validating transactions. When the disrupted nodes manage to recover and get back to work, they re-sync and catch up with the most recent data, provided by the nodes that were not affected.

The degree of protection each blockchain has against these attacks is related to the number of nodes and hash rate of the network. As the oldest and biggest cryptocurrency, Bitcoin is considered the most secure and resilient blockchain. This means that DDoS and other cyber attacks are much less likely to cause disruptions.

The Proof of Work consensus algorithm ensures that all network data is secured by cryptographic proofs. This means that it is almost impossible to change previously validated blocks. Altering the Bitcoin blockchain requires the entire structure to be unraveled record-by-record, something which is a practical impossibility even for the most powerful computers.

So, a successful attack would probably only be able to modify the transactions of a few recent blocks, for a short period of time. And even if the attacker manages to control more than 50% of the Bitcoin hashing power to perform the so-called 51% attack (or majority attack), the underlying protocol would be quickly updated as a response to thconclusion the

Why 01node stands out

03-What-Is-A-Dos-Attack

At 01node, We have seasoned infrastructures which have stood the test of time and ensures we deliver optimal services to our clients. These infrastructures include:

State-of-the-art Cisco equipment

The network model is a redundant “2n” type, which means that for any key network equipment there is an identical one that is ready to take over all traffic in case of an unwanted event or scheduled work without this having an impact on services. All of these factors lead to a network uptime of 99.99%.

Exchange layer and core

For the Exchange and Core layer, we use “6500E” series equipment equipped with Supervisor “2T XL” that guarantees the uninterrupted transit of any traffic and meets all the needs of a modern network.

Layer of distribution and aggregation

The distribution and aggregation layer was built using Cisco 4500 series (4900M, 4948-10GE).

Conclusion

Our protection against cyber attacks is based on a “packet” traffic analysis solution and high performance hardware equipped with 40GE network interfaces. The attack cleanupcapability is 140Gbps / 20Mpps.

Connectivity in our data center is achieved through stable interconnections with major national and international operators with peering of over 140Gbps. Thus, in our data center you will benefit from stable internet connectivity and 99.99% uptime guaranteed by SLA.

We breathe, we give! #WePlant