SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 7 /

How to Determine If You're Being Attacked with DDoS or Not

Hackers have found a new way to easily take down large sites.
That involves using a DDoS Distributed Denial of Service attack.
They infect thousands of computers and use them in the attack.
 
It may be hard for you to tell whether you're under a heavy DDoS attack (Distributed Denial of Service attack) or not, especially if you already have a not-so-consistent-but-at-least-affordable Internet Service Provider (ISP). However, it's important to note that the DoS attack (the version of the Denial of Service attack that's done in one location and IP address) and DDoS attack (the version of the DoS attack that's done in multiple locations and IP addresses) can be used to cripple computers and networks from all types of domains, from a simple image board dedicated to Anime and Manga discussions to a League of Legends tournament.
 

Undergoing a DDoS Attack or Not

Determining whether you're undergoing a DDoS attack or not requires you to open your command prompt, ping the "outside world" (like Google.com, for example), and then use certain orders and directions to ensure the authenticity of your DDoS investigation attempt. The default ping request is 4. You can put in the "-n" command for the sake of specifying the exact amount of ping requests you want the command prompt to execute. Meanwhile, the "-t" command is perfect when it comes to continuous ping action. You can halt this ping by pressing Ctrl and then C together. Take notice of the percentage of packets lost displayed below "Ping Statistics" as well as the number next to "time=". 
 

32 Byte Packet 

These bits of information will serve as your clues and puzzle pieces on what's going on. The time column indicates how long it takes for a 32-byte packet to travel from your PC to Google servers then back to your computer. If you've truly been DDoS, there would be obvious discrepancies in the statistics that will be explained in depth by this article. This is also known as your latency. At any rate, the first few phases of DDoS will have the number rise from 40ms to 800ms until a "Request Timed Out" message will appear. In summary, if you think you're undergoing a DDoS, your first course of action is to ping a reliable website that usually doesn't go down.
 

ISP Provider 

The thing about non-professional-level (as in Anonymous-tier or spammer-tier, terabytes' worth of packet flinging) DDoS is that like a diesel engine, it needs to warm up first, which means that you can usually catch the attacks before it actually builds up enough steam to truly cripple your system and whatnot, such that you're now completely disconnected and offline. Lag and ISP problems shouldn't be confused with a DDoS attack; if you really have no idea, contact your ISP provider and talk to him about whether or not your unavailable services are from their end on through the machinations of malicious marauders, virtual villains, and online outlaws.
 Utm firewall Appliance 

➤ Related pages
Changing My MAC Address
DDoS Attacks
How Do You Prevent DDoS Attacks?
How Do You Stop DDoS Attacks?
How Easy Is It to DDoS?
Short-Term Solution DDoS
Skype Proxy Be Used
What Is DDoS?
You're Being Attacked DDoS

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef