游戏产业的迅猛发展也让游戏产业成为被黑客攻击的重灾区。什么原因让游戏行业成为DDoS的攻击重点。总结有如下原因和主要手段:
1.游戏行业的攻击成本较低,攻防成本1:N。随着DDoS攻击的打法越来越复杂,攻击点更是越来越多,基本的静态防护策略已无法达到较好的效果,易攻难守的特点让游戏行业成为黑客的眼中肥肉。
2.游戏行业生命周期短。据2017年上半年游戏行业DDoS态势报告显示,90%的游戏业务在被攻击后的2-3天内会彻底下线,游戏公司日损失可大数百万元。黑客认定游戏公司为避免损失更大,相对更愿意支付“保护费”。
3.游戏行业对于持续性的要求更高,需要7*24*365在线畅通。据2017年上半年游戏行业DDoS态势报告显示,攻击超过2-3天以上,玩家一般会从几万人掉到几百人,玩家决定了游戏的存亡,失去玩家就等于频临垂死。
4.游戏行业火爆,同行之间竞争激烈,造成不少的恶意竞争。这也是导致游戏行业DDoS攻击数量剧增的原因之一。
当前游戏行业DDoS攻击的主要手段有以下几种:
SYN/ACK Flood 攻击
这种攻击方法是经典最有效的 DDOS 方法, 可通杀各种系统的网络服务, 主要是通过向受害主机发送大量伪造源 IP 和源端口的 SYN 或 ACK 包,导致主机的缓存资源被耗尽或忙于发送回应包而造成拒绝服务, 由于源都是伪造的故追踪起来比较困难, 缺点是实施起来有一定难度, 需要高带宽的僵尸主机支持。少量的这种攻击会导致主机服务器无法访问, 但却可以 Ping 的通, 在服务器上用 Netstat -na 命令会观察到存在大量的 SYN_RECEIVED 状态,大量的这种攻击会导致 Ping 失败、TCP/IP 栈失效,并会出现系统凝固现象,即不响应键盘和鼠标。普通防火墙大多无法抵御此种攻击。
TCP 全连接攻击
这种攻击是为了绕过常规防火墙的检查而设计的,一般情况下,常规防火墙大多具备过滤 T earDrop、Land 等 DOS 攻击的能力,但对于正常的 TCP 连接是放过的,殊不知很多网络服务程序(如:IIS、Apache 等 W eb 服务器)能接受的 TCP 连接数是有限的,一旦有大量的 TCP 连接,即便是正常的,也会导致网站访问非常缓慢甚至无法访问,TCP 全连接攻击就是通过许多僵尸主机不断地与受害服务器建立大量的 TCP 连接,直到服务器的内存等资源被耗尽而被拖跨, 从而造成拒绝服务, 这种攻击的特点是可绕过一般防火墙的防护而达到攻击目的,缺点是需要找很多僵尸主机,并且由于僵尸主机的 IP 是暴露的,因此容易被追踪。
刷脚本攻击
这种攻击主要是针对存在 ASP、JSP、PHP、CGI 等脚本程序,并调用 MSSQLServer、MySQLServer、Oracle 等数据库的网站系统而设计的,特征是和服务器建立正常的 TCP 连接, 并不断的向脚本程序提交查询、 列表等大量耗费数据库资源的调用, 一般来说, 提交一个 GET 或 POST 指令对客户端的耗费和带宽的占用是几乎可以忽略的,而服务器为处理此请求却可能要从上万条记录中去查出某个记录, 这种处理过程对资源的耗费是很大的, 常见的数据库服务器很少能支持数百个查询指令同时执行,而这对于客户端来说却是轻而易举的, 因此攻击者只需通过 Proxy 代理向主机服务器大量递交查询指令, 只需数分钟就会把服务器资源消耗掉而导致拒绝服务,常见的现象就是网站慢如蜗牛、ASP 程序失效、PHP 连接数据库失败、数据库主程序占用 CPU 偏高。这种攻击的特点是可以完全绕过普通的防火墙防护, 轻松找一些 Proxy 代理就可实施攻击, 缺点是对付只有静态页面的网站效果会大打折扣,并且有些 Proxy 会暴露攻击者的 IP 地址。
103.36.166.1
103.36.166.2
103.36.166.3
103.36.166.4
103.36.166.5
103.36.166.6
103.36.166.7
103.36.166.8
103.36.166.9
103.36.166.10
103.36.166.11
103.36.166.12
103.36.166.13
103.36.166.14
103.36.166.15
103.36.166.16
103.36.166.17
103.36.166.18
103.36.166.19
103.36.166.20
103.36.166.21
103.36.166.22
103.36.166.23
103.36.166.24
103.36.166.25
103.36.166.26
103.36.166.27
103.36.166.28
103.36.166.29
103.36.166.30
103.36.166.31
103.36.166.32
103.36.166.33
103.36.166.34
103.36.166.35
103.36.166.36
103.36.166.37
103.36.166.38
103.36.166.39
103.36.166.40
103.36.166.41
103.36.166.42
103.36.166.43
103.36.166.44
103.36.166.45
103.36.166.46
103.36.166.47
103.36.166.48
103.36.166.49
103.36.166.50
103.36.166.51
103.36.166.52
103.36.166.53
103.36.166.54
103.36.166.55
103.36.166.56
103.36.166.57
103.36.166.58
103.36.166.59
103.36.166.60
103.36.166.61
103.36.166.62
103.36.166.63
103.36.166.64
103.36.166.65
103.36.166.66
103.36.166.67
103.36.166.68
103.36.166.69
103.36.166.70
103.36.166.71
103.36.166.72
103.36.166.73
103.36.166.74
103.36.166.75
103.36.166.76
103.36.166.77
103.36.166.78
103.36.166.79
103.36.166.80
103.36.166.81
103.36.166.82
103.36.166.83
103.36.166.84
103.36.166.85
103.36.166.86
103.36.166.87
103.36.166.88
103.36.166.89
103.36.166.90
103.36.166.91
103.36.166.92
103.36.166.93
103.36.166.94
103.36.166.95
103.36.166.96
103.36.166.97
103.36.166.98
103.36.166.99
103.36.166.100
103.36.166.101
103.36.166.102
103.36.166.103
103.36.166.104
103.36.166.105
103.36.166.106
103.36.166.107
103.36.166.108
103.36.166.109
103.36.166.110
103.36.166.111
103.36.166.112
103.36.166.113
103.36.166.114
103.36.166.115
103.36.166.116
103.36.166.117
103.36.166.118
103.36.166.119
103.36.166.120
103.36.166.121
103.36.166.122
103.36.166.123
103.36.166.124
103.36.166.125
103.36.166.126
103.36.166.127
103.36.166.128
103.36.166.129
103.36.166.130
103.36.166.131
103.36.166.132
103.36.166.133
103.36.166.134
103.36.166.135
103.36.166.136
103.36.166.137
103.36.166.138
103.36.166.139
103.36.166.140
103.36.166.141
103.36.166.142
103.36.166.143
103.36.166.144
103.36.166.145
103.36.166.146
103.36.166.147
103.36.166.148
103.36.166.149
103.36.166.150
103.36.166.151
103.36.166.152
103.36.166.153
103.36.166.154
103.36.166.155
103.36.166.156
103.36.166.157
103.36.166.158
103.36.166.159
103.36.166.160
103.36.166.161
103.36.166.162
103.36.166.163
103.36.166.164
103.36.166.165
103.36.166.166
103.36.166.167
103.36.166.168
103.36.166.169
103.36.166.170
103.36.166.171
103.36.166.172
103.36.166.173
103.36.166.174
103.36.166.175
103.36.166.176
103.36.166.177
103.36.166.178
103.36.166.179
103.36.166.180
103.36.166.181
103.36.166.182
103.36.166.183
103.36.166.184
103.36.166.185
103.36.166.186
103.36.166.187
103.36.166.188
103.36.166.189
103.36.166.190
103.36.166.191
103.36.166.192
103.36.166.193
103.36.166.194
103.36.166.195
103.36.166.196
103.36.166.197
103.36.166.198
103.36.166.199
103.36.166.200
103.36.166.201
103.36.166.202
103.36.166.203
103.36.166.204
103.36.166.205
103.36.166.206
103.36.166.207
103.36.166.208
103.36.166.209
103.36.166.210
103.36.166.211
103.36.166.212
103.36.166.213
103.36.166.214
103.36.166.215
103.36.166.216
103.36.166.217
103.36.166.218
103.36.166.219
103.36.166.220
103.36.166.221
103.36.166.222
103.36.166.223
103.36.166.224
103.36.166.225
103.36.166.226
103.36.166.227
103.36.166.228
103.36.166.229
103.36.166.230
103.36.166.231
103.36.166.232
103.36.166.233
103.36.166.234
103.36.166.235
103.36.166.236
103.36.166.237
103.36.166.238
103.36.166.239
103.36.166.240
103.36.166.241
103.36.166.242
103.36.166.243
103.36.166.244
103.36.166.245
103.36.166.246
103.36.166.247
103.36.166.248
103.36.166.249
103.36.166.250
103.36.166.251
103.36.166.252
103.36.166.253
103.36.166.254文章来源:https://www.toymoban.com/news/detail-690969.html
103.36.166.255文章来源地址https://www.toymoban.com/news/detail-690969.html
到了这里,关于游戏服务器成DDoS最大攻击重灾区的文章就介绍完了。如果您还想了解更多内容,请在右上角搜索TOY模板网以前的文章或继续浏览下面的相关文章,希望大家以后多多支持TOY模板网!