Science, Maths & Technology

Source of denial

Updated Thursday 16th December 2010

Following the recent spates of denial of service attacks by hackers supporting Wikileaks, Tony Hirst offers some insight into what's involved

When a browser makes a request to a web server, it looks up the IP address for the server from one or more DNS providers, and then uses the physical address returned to make a connection to the actual webserver that publishes the content (see this article for more information). Webservers (and domain name servers) are like bar staff: they can only serve so many customers at once. In a distributed denial of service attack, multiple (ie, distributed) computers all try to request the same page at the same time. The server gets flustered, and handles as many requests as it can, but there are going to be some requests that can't be handled. Access is denied to those requests, and the website appears to the use to be down.

DDOS attacks are certainly inconvenient, but they're not really cyber war. LOIC (Low Orbit Ion Cannon), the tool used by the Anonymous collective that has been carrying out the DOS attacks to protest against the Wikileaks backlash, is a simple application typically used for testing web servers' capacity to handle a particular volume of requests. A feature of LOIC means that it can be controlled remotely using a protocol known as IRC (Internet Relay Chat), a forerunner to instant messaging favoured by system administrators. By stirring up emotions on Twitter and Facebook, the Anonymous collective encouraged others to download LOIC and turn control over to Anonymous, so they could mount attacks on websites deemed to be antagonistic to Wikileaks such as PayPal, Mastercard and Visa, all of whom had stopped supporting user donations to Wikileaks.

But beware: whilst participating in DDOS attack may feel the same a taking part in a sit-in, or standing on a picket line or barricade to prevent access to a physical location, in the UK at least the Police and Justice Act 2006 makes it illegal. And on purely sensible terms, voluntarily turning control of your computer to a self-declared hacker network is tantamount to madness!

 

For further information, take a look at our frequently asked questions which may give you the support you need.

Have a question?

Other content you may like

Mapping the world with data Creative commons image Icon Locals and Tourists #1 (GTWA #2): London / CC BY-SA 2.0 under Creative-Commons license article icon

Science, Maths & Technology 

Mapping the world with data

Technology lets us remap our world better than ever before. Tony Hirst explores where the data comes from and what we might use it for.

Article
If Wannacry caused so much disruption, how come it raised so little money? Creative commons image Icon Christiaan Colen under Creative Commons BY-SA 4.0 license article icon

Science, Maths & Technology 

If Wannacry caused so much disruption, how come it raised so little money?

Hundreds of thousands of computers locked across the globe - but Wannacry raised less than other ransomware attacks. Bill Buchanan explains why.

Article
Games With a Purpose Copyrighted image Icon Copyright: Google article icon

Science, Maths & Technology 

Games With a Purpose

Tony Hirst comes up with some ideas for new computer games using the Google Trends web service

Article
Watching the watchmen: CRISP researches the surveillance societies Copyrighted image Icon Copyright: Stephen Finn | Dreamstime.com article icon

Science, Maths & Technology 

Watching the watchmen: CRISP researches the surveillance societies

Introducing CRISP - research into how surveillance and privacy shapes society.

Article
What do I need to know about Heartbleed? Creative commons image Icon The Open University; original logo copyright Heartbleed.com under Creative-Commons license article icon

Science, Maths & Technology 

What do I need to know about Heartbleed?

There's a lot of advice and confusion about the Heartbleed security flaw - what do you need to know? And what do you need to do?

Article
Email: a square peg in a round hole Copyrighted image Icon Copyright: photos.com article icon

Science, Maths & Technology 

Email: a square peg in a round hole

Geoffrey Einon offers some useful advice for managing the tide of emails.

Article
How a Geek Changed the World transcript Copyrighted image Icon Copyright: Production team article icon

Science, Maths & Technology 

How a Geek Changed the World transcript

Fiona Bruce met Bill Gates as he stepped down from his role at Microsoft. This is a record of their conversation.

Article
Successful IT systems Copyrighted image Icon Copyright: © Exdez/Getty Images free course icon Level 3 icon

Science, Maths & Technology 

Successful IT systems

Information technology (IT) systems are a critical part of our world, in business and the public and voluntary sectors. They are often highly complex and interconnected combinations of technology, organisations and people. Success and failure of IT systems can be seen in many different settings. Many are highly successful; others fail, sometimes spectacularly. This free course focuses on success, to help you understand what is meant by a successful IT system.

Free course
9 hrs
Five ways to... find things fast online Copyrighted image Icon Copyright: Open2 team article icon

Science, Maths & Technology 

Five ways to... find things fast online

You know it’s out there but you can’t find it. Take your searching to the next level: five ways to find things fast online

Article