Science, Maths & Technology

Source of denial

Updated Thursday 16th December 2010

Following the recent spates of denial of service attacks by hackers supporting Wikileaks, Tony Hirst offers some insight into what's involved

When a browser makes a request to a web server, it looks up the IP address for the server from one or more DNS providers, and then uses the physical address returned to make a connection to the actual webserver that publishes the content (see this article for more information). Webservers (and domain name servers) are like bar staff: they can only serve so many customers at once. In a distributed denial of service attack, multiple (ie, distributed) computers all try to request the same page at the same time. The server gets flustered, and handles as many requests as it can, but there are going to be some requests that can't be handled. Access is denied to those requests, and the website appears to the use to be down.

DDOS attacks are certainly inconvenient, but they're not really cyber war. LOIC (Low Orbit Ion Cannon), the tool used by the Anonymous collective that has been carrying out the DOS attacks to protest against the Wikileaks backlash, is a simple application typically used for testing web servers' capacity to handle a particular volume of requests. A feature of LOIC means that it can be controlled remotely using a protocol known as IRC (Internet Relay Chat), a forerunner to instant messaging favoured by system administrators. By stirring up emotions on Twitter and Facebook, the Anonymous collective encouraged others to download LOIC and turn control over to Anonymous, so they could mount attacks on websites deemed to be antagonistic to Wikileaks such as PayPal, Mastercard and Visa, all of whom had stopped supporting user donations to Wikileaks.

But beware: whilst participating in DDOS attack may feel the same a taking part in a sit-in, or standing on a picket line or barricade to prevent access to a physical location, in the UK at least the Police and Justice Act 2006 makes it illegal. And on purely sensible terms, voluntarily turning control of your computer to a self-declared hacker network is tantamount to madness!

 

For further information, take a look at our frequently asked questions which may give you the support you need.

Have a question?

Other content you may like

The Future of Photo Slideshow Effects? Copyrighted image Icon Copyright: Production team article icon

Science, Maths & Technology 

The Future of Photo Slideshow Effects?

Take a static photo, add Fotowoosh - and suddenly you're panning round the shot.

Article
Animal-Computer Interaction and dogs Copyrighted image Icon Copyright: Damedeeso | Dreamstime.com video icon

Science, Maths & Technology 

Animal-Computer Interaction and dogs

Dr Clara Mancini tells us how Animal-Computer Interaction (ACI) is expanding the design of interactive systems beyond the human species.

Video
15 mins
TV catch-up with Kangaroo - or a dead cat bounce? Copyrighted image Icon Copyright: BBC article icon

Science, Maths & Technology 

TV catch-up with Kangaroo - or a dead cat bounce?

Is Kangaroo just a last ditch attempt by traditional terrestrial TV companies to hold on to their viewers?

Article
Learning Programming from Scratch Copyrighted image Icon Copyright: Dreamstime article icon

Science, Maths & Technology 

Learning Programming from Scratch

Scratch looks like child's play, is easy as child's play, but Tony Hirst thinks it's ideal for adults who have the itch to write computer programmes.

Article
Modelling object-oriented software – an introduction Copyrighted image Icon Copyright: Used with permission free course icon Level 2 icon

Science, Maths & Technology 

Modelling object-oriented software – an introduction

How do you model a software system? This free course, Modelling object-oriented software an introduction, will help you to work through the processes necessary to produce a conceptual model, by analysing the requirements document to identify classes and associations appropriate for modelling the system domain, together with their respective attributes and multiplicities.

Free course
20 hrs
A sharing society Copyrighted image Icon Copyright: Production team video icon

Science, Maths & Technology 

A sharing society

Former American vice-president Al Gore is enthusiastic, but Blaine Price warns there are risks alongside the opportunities offered in a sharing society.

Video
10 mins
Giving trees the open data treatment Copyrighted image Icon Copyright: Thomas Jenkins | Dreamstime.com article icon

Science, Maths & Technology 

Giving trees the open data treatment

Discover some unlikely open data releases that are opening up opportunities for innovation and adventure around our towns and cities.

Article
Social networking Copyrighted image Icon Copyright: Production team audio icon

Science, Maths & Technology 

Social networking

The Long Now's Stewart Brand and The Open University's Magnus Ramage explore how social networking is changing all communications.

Audio
10 mins
Simple Coding - Functions Copyrighted image Icon Copyright: © Nikolaev | Dreamstime.com activity icon

Science, Maths & Technology 

Simple Coding - Functions

Learn about functions in Python programming language. 

Activity