How to prevent LOIC DDOS attacks

DDoS attacks are launched online, specifically for "toolkits" that cause such attacks. One of the most famous toolkits, the earlier version, named after Ion Cannon, is a fictional weapon for a video game store called Command & conquer. Low Orbit Ion Cannon (LOIC) is an open source network stress test and DDOS attack The application is automatically added to the botnet by the client machine

Distributed Denial of Service Attacks are the amount of data traffic that a server receives when multiple systems send data for the purpose of flooding its bandwidth or resources. In most cases, this data flooding intention is to destroy the server to receive legitimate traffic, "denial of service" to the client to send a request to the server. For the end user, when the DDOS attack looks like a service request delay, no longer accept the new connection.

LOIC has been responsible for DDOS attacks on major sites such as PayPal, MasterCard and Visa, usually organized by anonymous organizations. The LOIC application has two versions: the first is a binary version or the original LOIC tool originally developed for the stress test network and the Web-based LOIC or JS LOIC.

LOIC application, first by Praetox Technologies to the target server to send a large number of HTTP, UDP or TCP requests. Even the lack of basic hacker skills users, LOIC is also very easy to use. What is needed is the URL of the target. In order to remotely control the LOIC, some hackers will use the IRC protocol to connect the attack to the Internet Relay Chart

. With this protocol, the subscriber becomes part of the botnet. The botnet is a network of damaged computer systems controlled by malware or viruses and sends a lot of traffic to the target system when prompted.

LOIC DDOS uses three types of attacks on the target machine. These include HTTP, UDP and TCP. These achieve the same attack mechanism, that is, to open multiple connections with the target machine, and to the target machine to send a continuous message sequence. The LOIC tool continues to send traffic to the target server until the server is overloaded. Once the server can not respond to legitimate user requests, it will be effectively closed.

Released in December 2010 JS LOIC is a Web-based tool that runs on a JavaScript-enabled Web browser and is therefore abbreviated to JS. The LOIC sends an ID and a message with a large number of connection requests to each ID and message. LOIC DDOS attack tool can easily find the attacker, the results of ordinary customers are not commonly used. On the other hand, hackers with certain skills can use the IRC network to attack within a team, it is difficult to identify the real people behind the attack.

The LOIC DDOS attack tool has been downloaded for millions of times because it is easy to use. Network administrators can use a powerful firewall to prevent or minimize attacks. The server administrator can then view the log to identify the IP of the sending traffic and block the IP from the server. Written firewall rules can form a good filter from LOIC DDOS to prevent attacks from being fully valid

Some experts claim that filtering UDP and ICMP traffic can also effectively address LOIC attacks. In order to be effective at the firewall level, the rules must be implemented early in the network link, for example at the ISP site operator, where the server is connected to the backbone via a broadband line

It is also important to check the broadband line to ensure that there is no limit.

LOIC DDOS Attack Two basic buffers can be used to mitigate this packet's throughput, method, heuristics, or signature control. The signature control uses a predetermined pattern to filter incoming traffic patterns and eliminate attacks. While effective repetitive attacks, it becomes a new attack pattern that occurs and will continue to be a problem until the signature is updated

On the other hand, the heuristic DDOS attack control system makes the "educated guess "

Normally these methods provide an approximate solution that requires to prevent DDOS attacks . Thus, heuristic signatures can provide real-time methods for problems. Other proprietary technologies may include allowing the system administrator to obtain alerts when a heuristic signature is detected by providing human-computer interaction of the user interface.