Science, Maths & Technology

Source of denial

Updated Thursday 16th December 2010

Following the recent spates of denial of service attacks by hackers supporting Wikileaks, Tony Hirst offers some insight into what's involved

When a browser makes a request to a web server, it looks up the IP address for the server from one or more DNS providers, and then uses the physical address returned to make a connection to the actual webserver that publishes the content (see this article for more information). Webservers (and domain name servers) are like bar staff: they can only serve so many customers at once. In a distributed denial of service attack, multiple (ie, distributed) computers all try to request the same page at the same time. The server gets flustered, and handles as many requests as it can, but there are going to be some requests that can't be handled. Access is denied to those requests, and the website appears to the use to be down.

DDOS attacks are certainly inconvenient, but they're not really cyber war. LOIC (Low Orbit Ion Cannon), the tool used by the Anonymous collective that has been carrying out the DOS attacks to protest against the Wikileaks backlash, is a simple application typically used for testing web servers' capacity to handle a particular volume of requests. A feature of LOIC means that it can be controlled remotely using a protocol known as IRC (Internet Relay Chat), a forerunner to instant messaging favoured by system administrators. By stirring up emotions on Twitter and Facebook, the Anonymous collective encouraged others to download LOIC and turn control over to Anonymous, so they could mount attacks on websites deemed to be antagonistic to Wikileaks such as PayPal, Mastercard and Visa, all of whom had stopped supporting user donations to Wikileaks.

But beware: whilst participating in DDOS attack may feel the same a taking part in a sit-in, or standing on a picket line or barricade to prevent access to a physical location, in the UK at least the Police and Justice Act 2006 makes it illegal. And on purely sensible terms, voluntarily turning control of your computer to a self-declared hacker network is tantamount to madness!

 

For further information, take a look at our frequently asked questions which may give you the support you need.

Have a question?

Other content you may like

The if...else statement Copyrighted image Icon Copyright: Dreamstime article icon

Science, Maths & Technology 

The if...else statement

Increase the power of your if statements with else.

Article
Giving trees the open data treatment Copyrighted image Icon Copyright: Thomas Jenkins | Dreamstime.com article icon

Science, Maths & Technology 

Giving trees the open data treatment

Discover some unlikely open data releases that are opening up opportunities for innovation and adventure around our towns and cities.

Article
More About Strings Copyright free image Icon Copyright free: Startupstockphotos via Pixabay article icon

Science, Maths & Technology 

More About Strings

Learn how to work more in-depth with strings in JavaScript.

Article
ICTs: Information Copyrighted image Icon Copyright: Used with permission free course icon Level 1 icon

Science, Maths & Technology 

ICTs: Information

BBC News 24, Sky News, CNN we live in an era where news has become almost instantaneous. This free course, ICTs: Information, will look at how news is gathered and the technology used for its dissemination. You will also be encouraged to examine how information might be manipulated by questioning its reliability.

Free course
20 hrs
Why has reaching the Chinese internet audience just got a little harder? Creative commons image Icon 陈 少举 under Creative Commons BY 4.0 license article icon

Science, Maths & Technology 

Why has reaching the Chinese internet audience just got a little harder?

The Chinese State is tightening rules on how foreign organisations reach its citizens online. Oiwan Lam explains.

Article
China and the internet Copyrighted image Icon Copyright: BBC video icon

Science, Maths & Technology 

China and the internet

John Perry Barlow's experiences suggest some in China are wary of the rapid change promised by the internet - but that doesn't mean it's a nation closed to innovation.

Video
5 mins
ICTs: device to device communication Copyrighted image Icon Copyright: Used with permission free course icon Level 1 icon

Science, Maths & Technology 

ICTs: device to device communication

Are you a technophobe? Bluetooth, Ethernet WiFi are they terms that mean nothing to you? ICTs: device to device communication, is a free course that will gently guide you to an understanding of how devices 'talk' to each other and what technologies and processes are involved. You will also look at wired and wireless communication technologies, introducing you to some of the key methods involved.

Free course
20 hrs
Two weeks to stop Gameover Zeus: What you need to know Creative commons image Icon Dave Mathis under CC BY-NC-ND 2.0 licence under Creative-Commons license article icon

Science, Maths & Technology 

Two weeks to stop Gameover Zeus: What you need to know

Here's why you should take some simple steps to protect yourself from Gameover Zeus if you use Microsoft Windows.

Article
DRM explained Copyrighted image Icon Copyright: Production team audio icon

Science, Maths & Technology 

DRM explained

The EFF's John Perry Barlow and Ray Corrigan of The Open University decry attempts to provide digital locks on content.

Audio
5 mins