{"id":474,"date":"2022-08-01T12:38:43","date_gmt":"2022-08-01T12:38:43","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=474"},"modified":"2022-08-01T12:38:43","modified_gmt":"2022-08-01T12:38:43","slug":"mi-az-a-ddos-tamadas","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/ddos\/mi-az-a-ddos-tamadas\/","title":{"rendered":"Mi az a DDoS-t\u00e1mad\u00e1s? A Teljes \u00datmutat\u00f3"},"content":{"rendered":"<p>A Distributed Denial of Service (DDoS) t\u00e1mad\u00e1s egy rosszindulat\u00fa k\u00eds\u00e9rlet arra, hogy egy online szolg\u00e1ltat\u00e1st el\u00e9rhetetlenn\u00e9 tegyenek az\u00e1ltal, hogy t\u00f6bb forr\u00e1sb\u00f3l \u00e9rkez\u0151 forgalommal t\u00falterhelik azt. Ez az \u00fatmutat\u00f3 mindent megtan\u00edt, amit tudnia kell a DDoS t\u00e1mad\u00e1sokr\u00f3l, bele\u00e9rtve azt is, hogyan v\u00e9dekezhet ellen\u00fck.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-ddos-attack\"><strong>Mi az a DDoS t\u00e1mad\u00e1s?<\/strong><\/h2>\n\n\n<p>A DDoS t\u00e1mad\u00e1s a hackel\u00e9s egy illeg\u00e1lis form\u00e1ja, amely sor\u00e1n egy szerverre ir\u00e1ny\u00edtott forgalom\u00e1radat akad\u00e1lyozza meg az embereket abban, hogy hozz\u00e1f\u00e9rjenek a kapcsol\u00f3d\u00f3 online szolg\u00e1ltat\u00e1sokhoz \u00e9s webhelyekhez.<\/p>\n\n\n\n<p>Sz\u00e1mos oka lehet annak, hogy valaki DDoS t\u00e1mad\u00e1st ind\u00edtson. Egyesek lehetnek d\u00fch\u00f6s \u00fcgyfelek vagy hacktivist\u00e1k, akik egy v\u00e1llalat szervereit akarj\u00e1k le\u00e1ll\u00edtani, hogy ezzel \u00fczenetet k\u00fcldjenek. M\u00e1sok sz\u00f3rakoz\u00e1sb\u00f3l vagy tiltakoz\u00e1sk\u00e9nt tehetik ezt.<\/p>\n\n\n\n<p>B\u00e1r a DDoS t\u00e1mad\u00e1sokat fel lehet haszn\u00e1lni egy v\u00e1llalat kifoszt\u00e1s\u00e1ra, els\u0151sorban p\u00e9nz\u00fcgyi agg\u00e1lyt jelentenek. P\u00e9ld\u00e1ul egy c\u00e9g internetes tev\u00e9kenys\u00e9g\u00e9t megszak\u00edtja vagy le\u00e1ll\u00edtja egy versenyt\u00e1rs, hogy \u00fcgyfeleket lopjon. Egy m\u00e1sik p\u00e9lda a zsarol\u00e1s, amikor a t\u00e1mad\u00f3k egy c\u00e9get c\u00e9loznak meg, \u00e9s hostware-t vagy zsarol\u00f3v\u00edrust telep\u00edtenek a szervereikre, miel\u0151tt hatalmas v\u00e1lts\u00e1gd\u00edjat k\u00f6veteln\u00e9nek a k\u00e1rok visszaford\u00edt\u00e1s\u00e1\u00e9rt.<\/p>\n\n\n\n<p>Sajnos a DDoS t\u00e1mad\u00e1sok az ut\u00f3bbi \u00e9vekben gyakoribb\u00e1 \u00e9s er\u0151sebb\u00e9 v\u00e1ltak, mivel az internet egyre fontosabb\u00e1 v\u00e1lt a v\u00e1llalkoz\u00e1sok \u00e9s az egy\u00e9nek sz\u00e1m\u00e1ra. Az IoT eszk\u00f6z\u00f6k n\u00f6veked\u00e9se is szerepet j\u00e1tszott ebben, mivel sok ilyen eszk\u00f6z k\u00f6nnyen felt\u00f6rhet\u0151, \u00e9s botnetek l\u00e9trehoz\u00e1s\u00e1ra haszn\u00e1lhat\u00f3, amelyek t\u00e1mad\u00e1sokat ind\u00edtanak.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-a-ddos-attack-work\"><strong>Hogyan m\u0171k\u00f6dik egy DDoS t\u00e1mad\u00e1s?<\/strong><\/h2>\n\n\n<p>A DDoS t\u00e1mad\u00e1s sor\u00e1n sok felt\u00f6rt sz\u00e1m\u00edt\u00f3g\u00e9pet haszn\u00e1lnak arra, hogy forgalmat k\u00fcldjenek egy webhelyre vagy szerverre, megnehez\u00edtve ezzel a webhely vagy szerver m\u0171k\u00f6d\u00e9s\u00e9t. Ezt \u00fagy lehet megtenni, hogy t\u00e1volr\u00f3l ir\u00e1ny\u00edtj\u00e1k ezeket a sz\u00e1m\u00edt\u00f3g\u00e9peket egy botnet seg\u00edts\u00e9g\u00e9vel, amely botok gy\u0171jtem\u00e9nye.<\/p>\n\n\n\n<p>Miut\u00e1n egy botnet l\u00e9trej\u00f6tt, a t\u00e1mad\u00f3 t\u00e1voli parancsokat k\u00fcldhet minden botnak, hogy ir\u00e1ny\u00edtsa a t\u00e1mad\u00e1st. Ez t\u00falterhelheti a c\u00e9l IP-c\u00edm\u00e9t k\u00e9r\u00e9sekkel, ami szolg\u00e1ltat\u00e1smegtagad\u00e1si t\u00e1mad\u00e1st eredm\u00e9nyez a szok\u00e1sos forgalom ellen.<\/p>\n\n\n\n<p>Mivel minden bot egy val\u00f3s eszk\u00f6z az interneten, neh\u00e9z lehet meghat\u00e1rozni, hogy a rendellenes forgalom v\u00e1rhat\u00f3-e.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-identify-a-ddos-attack\"><strong>Hogyan lehet azonos\u00edtani egy DDoS t\u00e1mad\u00e1st<\/strong><\/h2>\n\n\n<p>A DDoS t\u00e1mad\u00e1s legnehezebb r\u00e9sze, hogy nem l\u00e1that\u00f3k el\u0151jelek. \u00c1ltal\u00e1ban a jelent\u0151s hackercsoportok figyelmeztet\u00e9seket adnak a t\u00e1mad\u00e1s megkezd\u00e9se el\u0151tt, de a legt\u00f6bb t\u00e1mad\u00f3 figyelmeztet\u00e9s n\u00e9lk\u00fcl rendeli el a t\u00e1mad\u00e1st.<\/p>\n\n\n\n<p>Az emberek nem mindig mondj\u00e1k el, ha nem tetszik nekik a weboldal tartalma. Lehet, hogy f\u00e9lnek b\u00e1rmit is mondani. De ha valami nincs rendben, el fogj\u00e1k mondani. Lehet, hogy el\u0151sz\u00f6r nem mondj\u00e1k el, de k\u00e9s\u0151bb igen. Ez az\u00e9rt van, mert az emberek \u00e1ltal\u00e1ban nem ellen\u0151rzik a weboldal\u00e1t \u00fagy, ahogy \u00d6n. Azt hiszi, hogy minden rendben van, de n\u00e9ha nincs. \u00d3vatosnak kell lennie, mert n\u00e9ha vannak probl\u00e9m\u00e1k, amelyeket el\u0151sz\u00f6r nem l\u00e1t.<\/p>\n\n\n\n<p>Egy elosztott szolg\u00e1ltat\u00e1smegtagad\u00e1si t\u00e1mad\u00e1s forr\u00e1s\u00e1nak megtal\u00e1l\u00e1sa neh\u00e9z lehet. A t\u00e1mad\u00e1s sok \u00f3r\u00e1n \u00e1t tarthat, \u00e9s lehet, hogy nem tudja azonnal meg\u00e1ll\u00edtani. Ez azt jelenti, hogy \u00f3r\u00e1kig bev\u00e9telt \u00e9s szolg\u00e1ltat\u00e1st vesz\u00edt.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"mitigate-a-ddos-attack\"><strong>DDoS t\u00e1mad\u00e1s enyh\u00edt\u00e9se<\/strong><\/h3>\n\n\n<p>A legjobb m\u00f3dja annak, hogy megv\u00e9dje webhely\u00e9t egy DDoS t\u00e1mad\u00e1st\u00f3l, ha a lehet\u0151 leghamarabb \u00e9szleli azt. Ha az al\u00e1bbi jelek b\u00e1rmelyik\u00e9t \u00e9szleli, az azt jelenti, hogy jelenleg DDoS t\u00e1mad\u00e1s alatt \u00e1ll:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lass\u00fa bet\u00f6lt\u00e9s\u00a0<\/li>\n<li>A szerver 503-as hib\u00e1val v\u00e1laszol<\/li>\n<li>A TTL id\u0151t\u00fall\u00e9p\u00e9s<\/li>\n<li>T\u00falzott mennyis\u00e9g\u0171 spam hozz\u00e1sz\u00f3l\u00e1s<\/li>\n<li>A h\u00e1l\u00f3zat hirtelen megszakad<\/li>\n<li>Tipikus forgalmi mint\u00e1k vannak, p\u00e9ld\u00e1ul cs\u00facsok furcsa id\u0151pontokban<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-most-common-types-of-ddos-attacks\"><strong>A leggyakoribb DDoS t\u00e1mad\u00e1st\u00edpusok<\/strong><\/h2>\n\n\n<p>A b\u0171n\u00f6z\u0151k k\u00fcl\u00f6nf\u00e9le h\u00e1l\u00f3zati kapcsolatok c\u00e9lpontjak\u00e9nt haszn\u00e1lj\u00e1k a DDoS t\u00e1mad\u00e1sokat. A h\u00e1l\u00f3zat alapjainak meg\u00e9rt\u00e9se elengedhetetlen ahhoz, hogy meg\u00e9rts\u00fck, hogyan m\u0171k\u00f6dnek a k\u00fcl\u00f6nb\u00f6z\u0151 t\u00edpus\u00fa DDoS t\u00e1mad\u00e1sok.<\/p>\n\n\n\n<p>Az internetkapcsolatnak t\u00f6bb k\u00fcl\u00f6n\u00e1ll\u00f3 r\u00e9sze van, m\u00e1s n\u00e9ven r\u00e9tegek. Minden r\u00e9tegnek megvan a maga c\u00e9lja.<\/p>\n\n\n\n<p>Az OSI modell grafikus m\u00f3dja annak, hogy bemutassa, hogyan kapcsol\u00f3dnak a h\u00e1l\u00f3zat k\u00fcl\u00f6nb\u00f6z\u0151 r\u00e9szei. Azonban a jelenlegi internet egy egyszer\u0171bb rendszeren, az \u00fagynevezett TCP\/IP-n alapul. Az OSI modellt m\u00e9g mindig haszn\u00e1lj\u00e1k, mert seg\u00edt az embereknek l\u00e1tni \u00e9s meg\u00e9rteni, hogyan m\u0171k\u00f6dnek a h\u00e1l\u00f3zatok, \u00e9s elh\u00e1r\u00edtani az esetleges probl\u00e9m\u00e1kat.<\/p>\n\n\n\n<p>H\u00e1romf\u00e9le DDoS t\u00e1mad\u00e1s l\u00e9tezik. Az els\u0151 t\u00edpus az, amikor egy eszk\u00f6z t\u00falterhel\u0151dik forgalommal. A m\u00e1sodik t\u00edpus az, amikor egy h\u00e1l\u00f3zat t\u00falterhel\u0151dik forgalommal. A harmadik t\u00edpus akkor fordul el\u0151, amikor egy t\u00e1mad\u00f3 t\u00f6bb t\u00e1mad\u00e1si vektort haszn\u00e1l a c\u00e9lpont t\u00falterhel\u00e9s\u00e9re.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-481\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/osi-model-layers.png\" alt=\"Az osi modell r\u00e9tegei\" width=\"825\" height=\"737\" \/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"application-layer-attacks\"><strong>Alkalmaz\u00e1si r\u00e9teg t\u00e1mad\u00e1sok<\/strong><\/h3>\n\n\n<p>A felhaszn\u00e1l\u00f3i \u00e9lm\u00e9ny akkor kezd\u0151dik, amikor egy szem\u00e9ly el\u0151sz\u00f6r kapcsolatba l\u00e9p az internettel. Az alkalmaz\u00e1si r\u00e9teg DDoS t\u00e1mad\u00e1sok megakad\u00e1lyozz\u00e1k a szoftver m\u0171k\u00f6d\u00e9s\u00e9t, \u00edgy az emberek nem l\u00e1thatnak tartalmat. Ezekben a t\u00e1mad\u00e1sokban gyakran a webszervereket c\u00e9lozz\u00e1k meg, de m\u00e1s programok, p\u00e9ld\u00e1ul SIP hangszolg\u00e1ltat\u00e1sok \u00e9s BGP is t\u00e1madhat\u00f3k.<\/p>\n\n\n\n<p>A TCP\/IP protokoll k\u00e9pes adatokat tov\u00e1bb\u00edtani az eszk\u00f6z\u00f6k k\u00f6z\u00f6tt egy h\u00e1l\u00f3zaton. De ez a protokoll nagyon sebezhet\u0151 a DDoS t\u00e1mad\u00e1sokkal szemben. Ez azt jelenti, hogy valaki megt\u00e1madhatja az eszk\u00f6z\u00e9t, \u00e9s megakad\u00e1lyozhatja annak m\u0171k\u00f6d\u00e9s\u00e9t az\u00e1ltal, hogy egyszerre sok adatot k\u00fcld. B\u00e1r egyesek frusztr\u00e1ltak lehetnek emiatt, m\u00e9gis fontos egy biztons\u00e1gos protokoll haszn\u00e1lata az online tranzakci\u00f3khoz. A kommunik\u00e1ci\u00f3 titkos\u00edt\u00e1sa megv\u00e9di mindk\u00e9t felet az elfog\u00e1st\u00f3l \u00e9s a lehallgat\u00e1st\u00f3l. A legt\u00f6bb DDoS t\u00e1mad\u00e1s sokkal kevesebb csomagot haszn\u00e1l m\u00e1sodpercenk\u00e9nt.<\/p>\n\n\n\n<p>Ez a t\u00e1mad\u00e1s megk\u00f6veteln\u00e9 a c\u00e9lzott alkalmaz\u00e1s specifikus protokollj\u00e1nak haszn\u00e1lat\u00e1t, amely k\u00e9zfog\u00e1sokat \u00e9s megfelel\u00e9st is mag\u00e1ban foglalhat. Ezeket a t\u00e1mad\u00e1sokat els\u0151sorban olyan IoT eszk\u00f6z\u00f6k hajtj\u00e1k v\u00e9gre, amelyeket nem lehet k\u00f6nnyen hamis\u00edtani.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"example-of-application%25c2%25a0ddos-attacks\"><strong>P\u00e9lda az alkalmaz\u00e1si DDoS t\u00e1mad\u00e1sokra<\/strong><\/h3>\n\n\n<p><strong>HTTP \u00e1radat<\/strong><\/p>\n\n\n\n<p>Ez egy szerver, amely sok k\u00fcl\u00f6nb\u00f6z\u0151 sz\u00e1m\u00edt\u00f3g\u00e9pr\u0151l fogad k\u00e9r\u00e9seket. Ez a m\u00f3dszer, mint p\u00e9ld\u00e1ul egy weboldal friss\u00edt\u00e9se sok PC-n egyszerre, sok HTTP k\u00e9r\u00e9st k\u00fcld a szervernek, t\u00falterhelve azt. A t\u00e1mad\u00e1s lehet egyszer\u0171 vagy \u00f6sszetett.<\/p>\n\n\n\n<p>Egy URL el\u00e9rhet\u0151 ugyanazon t\u00e1mad\u00f3 IP-c\u00edmek, hivatkoz\u00f3 oldalak \u00e9s felhaszn\u00e1l\u00f3i \u00fcgyn\u00f6k\u00f6k tartom\u00e1ny\u00e1val. Ez megk\u00f6nny\u00edti a t\u00e1mad\u00f3 sz\u00e1m\u00e1ra a c\u00e9l URL megtal\u00e1l\u00e1s\u00e1t \u00e9s haszn\u00e1lat\u00e1t. Az \u00f6sszetettebb v\u00e1ltozatok k\u00fcl\u00f6nf\u00e9le URL-eket c\u00e9lozhatnak meg k\u00fcl\u00f6nb\u00f6z\u0151 hivatkoz\u00f3k \u00e9s felhaszn\u00e1l\u00f3i \u00fcgyn\u00f6k\u00f6k haszn\u00e1lat\u00e1val.<\/p>\n\n\n\n<p><strong>Protokoll t\u00e1mad\u00e1sok<\/strong><\/p>\n\n\n\n<p>A Protokoll \u00c1radat egy DDoS t\u00e1mad\u00e1s, amely sok forgalmat k\u00fcld egy szolg\u00e1ltat\u00e1snak vagy h\u00e1l\u00f3zatnak, megnehez\u00edtve annak haszn\u00e1lat\u00e1t. A harmadik \u00e9s negyedik r\u00e9teg protokoll stack sebezhet\u0151s\u00e9geit kihaszn\u00e1lva.<\/p>\n\n\n\n<p>A DDoS t\u00e1mad\u00e1sok gyakran c\u00e9loznak sok alacsony biztons\u00e1g\u00fa, v\u00e9dtelen \u00e9s nem biztos\u00edtott protokollt. A DDoS t\u00e1mad\u00e1sok gyakran c\u00e9lozz\u00e1k meg az internetes kommunik\u00e1ci\u00f3s szabv\u00e1nyokat. Ennek oka, hogy sok ilyen rendszert vil\u00e1gszerte haszn\u00e1lnak, \u00e9s neh\u00e9z gyorsan m\u00f3dos\u00edtani \u0151ket. Tov\u00e1bb\u00e1, mivel sok protokollnak van bels\u0151 bonyolults\u00e1ga, m\u00e9g akkor is, ha \u00fajra vizsg\u00e1lj\u00e1k \u0151ket a jelenlegi hib\u00e1k kezel\u00e9s\u00e9re, \u00faj sebezhet\u0151s\u00e9gek jelennek meg, amelyek lehet\u0151v\u00e9 teszik \u00faj t\u00edpus\u00fa protokoll t\u00e1mad\u00e1sok \u00e9s h\u00e1l\u00f3zati t\u00e1mad\u00e1sok v\u00e9grehajt\u00e1s\u00e1t.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-protocol-ddos-attacks\"><strong>P\u00e9ld\u00e1k a protokoll DDoS t\u00e1mad\u00e1sokra<\/strong><\/h4>\n\n\n<p><strong>(BGP) elt\u00e9r\u00edt\u00e9s<\/strong><\/p>\n\n\n\n<p>A felh\u0151alap\u00fa szolg\u00e1ltat\u00e1sok sok \u00e9rt\u00e9kes inform\u00e1ci\u00f3t tartalmaznak, amelyeket az adat tolvajok meg akarnak szerezni. Ennek oka, hogy hasznos inform\u00e1ci\u00f3kat szerezhetnek ezekb\u0151l a szolg\u00e1ltat\u00e1sokb\u00f3l. Ha az egyik szolg\u00e1ltat\u00f3t\u00f3l adatlop\u00e1s t\u00f6rt\u00e9nik, az nagyon vesz\u00e9lyes lehet. Valaki DDoS t\u00e1mad\u00e1st ind\u00edthat egy v\u00e1llalat ellen a felh\u0151n\u00e9l magasabb protokollok haszn\u00e1lat\u00e1val. A BGP (Border Gateway Protocol) inform\u00e1ci\u00f3t k\u00f6z\u00f6l a h\u00e1l\u00f3zati c\u00edmterekr\u0151l.<\/p>\n\n\n\n<p>A BGP friss\u00edt\u00e9seket a h\u00e1l\u00f3zatok k\u00f6z\u00f6tti inform\u00e1ci\u00f3megoszt\u00e1sra haszn\u00e1lj\u00e1k. Ha valaki hamis friss\u00edt\u00e9st k\u00fcld, a forgalom m\u00e1s h\u00e1l\u00f3zatba ker\u00fclhet. Ez felhaszn\u00e1lhatja az er\u0151forr\u00e1sokat \u00e9s torl\u00f3d\u00e1st okozhat. A BGP biztons\u00e1gosabb verzi\u00f3ra val\u00f3 friss\u00edt\u00e9se id\u0151ig\u00e9nyes \u00e9s k\u00f6lts\u00e9ges lenne, mivel vil\u00e1gszerte t\u00f6bb t\u00edzezer h\u00e1l\u00f3zati \u00fczemeltet\u0151 haszn\u00e1lja.<\/p>\n\n\n\n<p><strong>SYN \u00e1radat<\/strong><\/p>\n\n\n\n<p>A TCP SYN \u00c1radat olyan, mint egy ell\u00e1t\u00e1si munk\u00e1s, aki rendel\u00e9seket kap az \u00fczlet elej\u00e9r\u0151l.<\/p>\n\n\n\n<p>A sof\u0151r megkapja a csomagot, v\u00e1rja a meger\u0151s\u00edt\u00e9st, majd a k\u00e9r\u00e9s meg\u00e9rkez\u00e9se ut\u00e1n elviszi el\u0151re. Az alkalmazott sz\u00e1mos sz\u00e1ll\u00edt\u00e1si k\u00e9r\u00e9st kap meger\u0151s\u00edt\u00e9s n\u00e9lk\u00fcl, am\u00edg nem tud t\u00f6bb sz\u00e1ll\u00edtm\u00e1nyt kezelni. Ez t\u00falterhelheti \u0151ket.<\/p>\n\n\n\n<p>Ebben a t\u00e1mad\u00e1sban a t\u00e1mad\u00f3 sok csomagot k\u00fcld az \u00e1ldozatnak. A csomagok hamis c\u00edmekkel rendelkeznek. Kihaszn\u00e1lj\u00e1k a k\u00e9zfog\u00e1st, amelyet k\u00e9t sz\u00e1m\u00edt\u00f3g\u00e9p haszn\u00e1l a h\u00e1l\u00f3zati kapcsolat megkezd\u00e9s\u00e9hez.<\/p>\n\n\n\n<p>A betolakod\u00f3 c\u00e9lja, hogy min\u00e9l t\u00f6bb kapcsol\u00f3d\u00e1si k\u00eds\u00e9rletet enged\u00e9lyezzen, miel\u0151tt le\u00e1ll\u00edtan\u00e1 az er\u0151forr\u00e1sait.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"volumetric-attacks\"><strong>Volumetrikus t\u00e1mad\u00e1sok<\/strong><\/h3>\n\n\n<p>Ennek a t\u00e1mad\u00e1snak a c\u00e9lja, hogy felhaszn\u00e1lja az \u00f6sszes internetes s\u00e1vsz\u00e9less\u00e9get a c\u00e9lpont \u00e9s a vil\u00e1g t\u00f6bbi r\u00e9sze k\u00f6z\u00f6tt. Az adatokat a c\u00e9lponthoz k\u00e9tf\u00e9lek\u00e9ppen k\u00fcldik: er\u0151s\u00edt\u00e9s vagy egy m\u00e1sik m\u00f3dszer a hatalmas forgalom gener\u00e1l\u00e1s\u00e1ra, p\u00e9ld\u00e1ul egy botnetb\u0151l \u00e9rkez\u0151 k\u00e9r\u00e9sek.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-volumetric-attacks\"><strong>P\u00e9ld\u00e1k a volumetrikus t\u00e1mad\u00e1sokra<\/strong><\/h4>\n\n\n<p><strong>DNS er\u0151s\u00edt\u00e9s<\/strong><\/p>\n\n\n\n<p>A t\u00e1mad\u00f3 kis lek\u00e9rdez\u00e9seket k\u00fcld egy DNS szervernek, de a szerver a lek\u00e9rdez\u00e9st sokkal nagyobb terhel\u00e9ss\u00e9 er\u0151s\u00edti, amely \u00f6sszeomlasztja az \u00e1ldozat szervereit. Ezt a t\u00e1mad\u00e1st er\u0151s\u00edt\u0151 DDoS t\u00e1mad\u00e1snak nevezik.<\/p>\n\n\n\n<p>A DNS er\u0151s\u00edt\u00e9s egy olyan h\u00e1l\u00f3zati t\u00e1mad\u00e1s, amely sor\u00e1n a t\u00e1mad\u00f3 \u00fczeneteket k\u00fcld az \u00e1ldozat h\u00e1l\u00f3zat\u00e1nak DNS szerverein kereszt\u00fcl. A csomagok er\u0151s\u00edthet\u0151k, ami megnehez\u00edti a blokkol\u00e1sukat.<\/p>\n\n\n\n<p>A DNS er\u0151s\u00edt\u00e9s egy t\u00e1mad\u00e1s, amely sor\u00e1n valaki becsap egy DNS felold\u00f3t, hogy sok inform\u00e1ci\u00f3t k\u00fcldj\u00f6n neki. Ez akkor t\u00f6rt\u00e9nik, amikor hamis k\u00e9r\u00e9st k\u00fcldenek a DNS felold\u00f3nak egy nem val\u00f3s c\u00edmmel. Mivel sokan csin\u00e1lj\u00e1k ezt, \u00e9s sok DNS felold\u00f3 van, az \u00e1ldozat h\u00e1l\u00f3zata gyorsan t\u00falterhelhet\u0151.<\/p>\n\n\n\n<p><strong>DDoS t\u00e1mad\u00e1s enyh\u00edt\u00e9se<\/strong><\/p>\n\n\n\n<p>Amikor egy DDoS t\u00e1mad\u00e1s \u00e9ri az embereket, gyakran \u00f6sszezavarodnak. Sok biztons\u00e1gi rendszer nem ad r\u00e9szletes inform\u00e1ci\u00f3t a bej\u00f6v\u0151 forgalomr\u00f3l. Az egyetlen biztos dolog egy DDoS t\u00e1mad\u00e1s eset\u00e9n, hogy az \u00fcgyfelek online alkalmaz\u00e1sai el\u00e9rhetetlenek voltak egy h\u00e1l\u00f3zati le\u00e1ll\u00e1s miatt. A probl\u00e9ma s\u00falyosbodik, ha egy helysz\u00edni biztons\u00e1gi eszk\u00f6z v\u00e9di a c\u00e9lzott h\u00e1l\u00f3zatot.<\/p>\n\n\n\n<p>R\u00e9gi szoftver haszn\u00e1lata nem biztons\u00e1gos, ha sz\u00e1m\u00edt\u00f3g\u00e9pe r\u00e9gi szoftvert haszn\u00e1l. Ennek oka, hogy lehetnek biztons\u00e1gi kock\u00e1zatok, amelyekr\u0151l nem tud. Rendszeresen friss\u00edtenie kell sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9t a leg\u00fajabb jav\u00edt\u00e1sokkal \u00e9s szoftverekkel, hogy ezt megoldja. Azonban ez neh\u00e9z lehet, mert folyamatosan \u00faj sebezhet\u0151s\u00e9geket fedeznek fel. A hackerek ezeket a sebezhet\u0151s\u00e9geket haszn\u00e1lhatj\u00e1k ki, hogy felt\u00f6rj\u00e9k a sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9t \u00e9s ellopj\u00e1k az inform\u00e1ci\u00f3it.<\/p>\n\n\n\n<p>Egyes t\u00e1mad\u00f3k DDoS-t haszn\u00e1lhatnak c\u00e9ljaik el\u00e9r\u00e9s\u00e9re. Azonban sz\u00e1mos akad\u00e1ly van. A helysz\u00edni biztons\u00e1gi megold\u00e1sok nem tudj\u00e1k megakad\u00e1lyozni a t\u00e1mad\u00e1s bek\u00f6vetkez\u00e9s\u00e9t. Miel\u0151tt a t\u00e1mad\u00e1s el\u00e9rn\u00e9 a helysz\u00edni sz\u0171r\u0151eszk\u00f6zt, a volumetrikus t\u00e1mad\u00e1sok elt\u00f6m\u00edthetik a bej\u00f6v\u0151 internetes cs\u00f6vet, \u00e9s t\u00falterhelhetik a fels\u0151 szint\u0171 ISP-t, ami az \u00f6sszes bej\u00f6v\u0151 forgalom fekete lyukba ir\u00e1ny\u00edt\u00e1s\u00e1t eredm\u00e9nyezi, elv\u00e1gva a c\u00e9lh\u00e1l\u00f3zatot az internett\u0151l.\u00a0<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-defend-against-ddos-attacks\">Hogyan v\u00e9dekezhet a DDoS t\u00e1mad\u00e1sok ellen<\/h2>\n\n\n<p>Sz\u00e1mos m\u00f3dja van a DDoS t\u00e1mad\u00e1sok elleni v\u00e9dekez\u00e9snek. A legfontosabb, hogy legyen egy terv, miel\u0151tt megt\u00e1madn\u00e1k.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"increase-bandwidth\">S\u00e1vsz\u00e9less\u00e9g n\u00f6vel\u00e9se<\/h3>\n\n\n<p>Az egyik legfontosabb dolog, amit tehet, hogy megv\u00e9dje mag\u00e1t a DDoS t\u00e1mad\u00e1sokt\u00f3l, hogy biztos\u00edtja, hogy a t\u00e1rhely infrastrukt\u00far\u00e1ja k\u00e9pes kezelni a sok forgalmat. Ez azt jelenti, hogy fel kell k\u00e9sz\u00fclnie a v\u00e1ratlan forgalmi cs\u00facsokra, amelyek akkor fordulhatnak el\u0151, amikor valaki felt\u00f6ri a weboldal\u00e1t. Azonban a s\u00e1vsz\u00e9less\u00e9g n\u00f6vel\u00e9se nem mindig jelenti azt, hogy v\u00e9dve lesz a DDoS t\u00e1mad\u00e1sokt\u00f3l.<\/p>\n\n\n\n<p>Amikor n\u00f6veli a s\u00e1vsz\u00e9less\u00e9g\u00e9t, nehezebb\u00e9 v\u00e1lik a t\u00e1mad\u00f3k sz\u00e1m\u00e1ra, hogy bet\u00f6rjenek a weboldal\u00e1ra. Azonban jav\u00edthatja weboldala biztons\u00e1g\u00e1t k\u00fcl\u00f6nf\u00e9le int\u00e9zked\u00e9sekkel.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"set-serverlevel-ddos-mitigation\">Szerver szint\u0171 DDoS enyh\u00edt\u00e9s be\u00e1ll\u00edt\u00e1sa<\/h3>\n\n\n<p>Egyes webt\u00e1rhelyek rendelkeznek DDoS enyh\u00edt\u0151 szoftverrel szerver szinten. Ez a funkci\u00f3 nem mindig el\u00e9rhet\u0151, ez\u00e9rt k\u00e9rdezze meg webt\u00e1rhely szolg\u00e1ltat\u00f3j\u00e1t, hogy k\u00edn\u00e1lj\u00e1k-e ezt. Ha igen, der\u00edtse ki, hogy ingyenes szolg\u00e1ltat\u00e1s-e, vagy van-e d\u00edja. Ennek a szolg\u00e1ltat\u00e1snak az el\u00e9rhet\u0151s\u00e9ge a szolg\u00e1ltat\u00f3t\u00f3l \u00e9s a t\u00e1rhelycsomagt\u00f3l f\u00fcgg.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"move-to-cloudbased-hosting\">\u00c1tt\u00e9r\u00e9s felh\u0151alap\u00fa t\u00e1rhelyre<\/h3>\n\n\n<p>A felh\u0151alap\u00fa t\u00e1rhely egy olyan webt\u00e1rhely t\u00edpus, amely felh\u0151alap\u00fa sz\u00e1m\u00edt\u00e1stechnikai szolg\u00e1ltat\u00e1sokat haszn\u00e1l a szolg\u00e1ltat\u00e1sai ny\u00fajt\u00e1s\u00e1ra. A felh\u0151alap\u00fa t\u00e1rhely rugalmasabb \u00e9s megb\u00edzhat\u00f3bb lehet, mint a hagyom\u00e1nyos webt\u00e1rhely.<\/p>\n\n\n\n<p>A felh\u0151alap\u00fa t\u00e1rhely egyik el\u0151nye, hogy ellen\u00e1ll\u00f3bb lehet a DDoS t\u00e1mad\u00e1sokkal szemben. Ennek oka, hogy a felh\u0151szolg\u00e1ltat\u00f3knak megvannak az er\u0151forr\u00e1saik a DDoS t\u00e1mad\u00e1sok elnyel\u00e9s\u00e9re \u00e9s elh\u00e1r\u00edt\u00e1s\u00e1ra.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rate-limiting\">K\u00e9r\u00e9skorl\u00e1toz\u00e1s<\/h3>\n\n\n<p>A szerver \u00e1ltal elfogadott k\u00e9r\u00e9sek sz\u00e1m\u00e1nak korl\u00e1toz\u00e1sa egy bizonyos id\u0151 alatt seg\u00edthet a szolg\u00e1ltat\u00e1smegtagad\u00e1si t\u00e1mad\u00e1sok megel\u0151z\u00e9s\u00e9ben. A k\u00e9r\u00e9skorl\u00e1toz\u00e1s seg\u00edthet megakad\u00e1lyozni a webkapar\u00f3k inform\u00e1ci\u00f3lop\u00e1s\u00e1t \u00e9s cs\u00f6kkenteni a brute force bejelentkez\u00e9seket, de \u00f6nmag\u00e1ban nem biztos, hogy elegend\u0151 egy fejlett DDoS t\u00e1mad\u00e1s kezel\u00e9s\u00e9re.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-content-delivery-network-cdn\">Tartalomk\u00e9zbes\u00edt\u00e9si h\u00e1l\u00f3zat (CDN) haszn\u00e1lata<\/h3>\n\n\n<p>A CDN egy szerverh\u00e1l\u00f3zat, amely a felhaszn\u00e1l\u00f3knak a f\u00f6ldrajzi hely\u00fck alapj\u00e1n sz\u00e1ll\u00edt tartalmat. A CDN-ek haszn\u00e1lhat\u00f3k a weboldalak teljes\u00edtm\u00e9ny\u00e9nek jav\u00edt\u00e1s\u00e1ra \u00e9s a DDoS t\u00e1mad\u00e1sok elleni v\u00e9delemre.<\/p>\n\n\n\n<p>Amikor CDN-t haszn\u00e1l, a weboldala statikus tartalma a CDN szerverein van gyors\u00edt\u00f3t\u00e1razva. Ezt a tartalmat a felhaszn\u00e1l\u00f3khoz a hozz\u00e1juk legk\u00f6zelebbi szerver sz\u00e1ll\u00edtja. A CDN seg\u00edthet jav\u00edtani a weboldala teljes\u00edtm\u00e9ny\u00e9t \u00e9s megv\u00e9deni a DDoS t\u00e1mad\u00e1sokt\u00f3l.<\/p>\n\n\n\n<p>T\u00f6bb CDN-t is haszn\u00e1lhat, hogy a weboldala statikus tartalm\u00e1t k\u00fcl\u00f6nb\u00f6z\u0151 szerverekr\u0151l sz\u00e1ll\u00edtsa vil\u00e1gszerte. Ez megb\u00edzhat\u00f3bb\u00e1 \u00e9s er\u0151sebb\u00e9 teszi a weboldal\u00e1t. Ezenk\u00edv\u00fcl, ha Multi-CDN megold\u00e1st haszn\u00e1l, kihaszn\u00e1lhatja t\u00f6bb CDN szolg\u00e1ltat\u00f3 \u00e1ltal biztos\u00edtott PoP h\u00e1l\u00f3zatot.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"blackhole-routing\">Fekete lyuk \u00fatvonal<\/h3>\n\n\n<p>A fekete lyuk \u00fatvonal nagyszer\u0171 m\u00f3dja annak, hogy a h\u00e1l\u00f3zati adminisztr\u00e1torok szinte b\u00e1rmilyen probl\u00e9m\u00e1t kezeljenek. Amikor a fekete lyuk sz\u0171r\u00e9s bonyolult szab\u00e1lyok n\u00e9lk\u00fcl t\u00f6rt\u00e9nik, egy null \u00fatvonalat haszn\u00e1lnak a j\u00f3 \u00e9s rossz h\u00e1l\u00f3zati forgalom elutas\u00edt\u00e1s\u00e1ra.<\/p>\n\n\n\n<p>Ha egy DDoS t\u00e1mad\u00e1s egy szervert c\u00e9loz meg, az internetszolg\u00e1ltat\u00f3 (ISP) megpr\u00f3b\u00e1lhatja meg\u00e1ll\u00edtani a t\u00e1mad\u00e1st az\u00e1ltal, hogy az oldal \u00f6sszes forgalm\u00e1t egy fekete lyukba ir\u00e1ny\u00edtja. Ez nem ide\u00e1lis, mert ezzel a t\u00e1mad\u00f3 el\u00e9ri a c\u00e9lj\u00e1t: a h\u00e1l\u00f3zat el\u00e9rhetetlenn\u00e9 v\u00e1lik.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-web-application-firewall-waf\">Webalkalmaz\u00e1s t\u0171zfal (WAF) haszn\u00e1lata<\/h3>\n\n\n<p>A WAF egy olyan biztons\u00e1gi szoftver, amely seg\u00edt megv\u00e9deni a weboldalakat a t\u00e1mad\u00e1sokt\u00f3l. A WAF-ek ellen\u0151rzik a bej\u00f6v\u0151 forgalmat, \u00e9s blokkolj\u00e1k vagy \u00e1tir\u00e1ny\u00edtj\u00e1k a rosszindulat\u00fa k\u00f3dot tartalmaz\u00f3 k\u00e9r\u00e9seket.<\/p>\n\n\n\n<p>Haszn\u00e1lhat WAF-et a weboldala v\u00e9delm\u00e9re a DDoS t\u00e1mad\u00e1sok ellen. Azonban biztos\u00edtania kell, hogy a WAF megfelel\u0151en legyen konfigur\u00e1lva. Ellenkez\u0151 esetben blokkolhatja a jogos forgalmat.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-your-network-for-unusual-activity\">Figyelje a h\u00e1l\u00f3zat\u00e1t szokatlan tev\u00e9kenys\u00e9gek ut\u00e1n<\/h3>\n\n\n<p>Figyelnie kell a h\u00e1l\u00f3zat\u00e1t szokatlan tev\u00e9kenys\u00e9gek ut\u00e1n. Ez mag\u00e1ban foglalja a hirtelen forgalomn\u00f6veked\u00e9sek \u00e9s furcsa k\u00e9r\u00e9sek figyel\u00e9s\u00e9t.<\/p>\n\n\n\n<p>Ha b\u00e1rmilyen szokatlan tev\u00e9kenys\u00e9get \u00e9szlel, azonnal vizsg\u00e1lja meg. Lehet, hogy ez annak a jele, hogy a weboldala t\u00e1mad\u00e1s alatt \u00e1ll.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"in-a-nutshell\"><strong>R\u00f6viden<\/strong><\/h2>\n\n\n<p>A DDoS t\u00e1mad\u00e1sok puszt\u00edt\u00f3ak lehetnek a v\u00e1llalkoz\u00e1sok sz\u00e1m\u00e1ra. Le\u00e1ll\u00e1st, bev\u00e9telkies\u00e9st \u00e9s a h\u00edrn\u00e9v k\u00e1rosod\u00e1s\u00e1t okozhatj\u00e1k.<\/p>\n\n\n\n<p>Azonban megv\u00e9dheti weboldal\u00e1t a DDoS t\u00e1mad\u00e1sokt\u00f3l k\u00fcl\u00f6nf\u00e9le int\u00e9zked\u00e9sek, p\u00e9ld\u00e1ul szerver szint\u0171 DDoS enyh\u00edt\u00e9s, felh\u0151alap\u00fa t\u00e1rhely, k\u00e9r\u00e9skorl\u00e1toz\u00e1s \u00e9s CDN haszn\u00e1lata r\u00e9v\u00e9n. Figyelnie kell a h\u00e1l\u00f3zat\u00e1t szokatlan tev\u00e9kenys\u00e9gek ut\u00e1n, \u00e9s azonnal vizsg\u00e1lja meg a gyan\u00fas tev\u00e9kenys\u00e9geket.<\/p>\n\n\n\n<p>Ezekkel a l\u00e9p\u00e9sekkel biztos\u00edthatja, hogy weboldala el\u00e9rhet\u0151 \u00e9s hozz\u00e1f\u00e9rhet\u0151 legyen a felhaszn\u00e1l\u00f3i sz\u00e1m\u00e1ra, m\u00e9g egy DDoS t\u00e1mad\u00e1s eset\u00e9n is.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ddos-attack-faqs\">DDoS t\u00e1mad\u00e1s GYIK<\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div id=\"faq-question-1659357825601\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">K\u00f6nny\u0171 DDoS t\u00e1mad\u00e1st v\u00e9grehajtani?<\/strong>\n<p class=\"schema-faq-answer\">A DDoS t\u00e1mad\u00e1sok \u00f6sszetettek lehetnek, \u00e9s bizonyos szint\u0171 technikai szak\u00e9rtelmet ig\u00e9nyelnek. Azonban a DDoS-b\u00e9rl\u00e9s szolg\u00e1ltat\u00e1sok most lehet\u0151v\u00e9 teszik b\u00e1rki sz\u00e1m\u00e1ra, hogy t\u00e1mad\u00e1st ind\u00edtson.<\/p>\n<\/div>\n<div id=\"faq-question-1659357852139\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Mi a c\u00e9lja a DDoS t\u00e1mad\u00e1snak?<\/strong>\n<p class=\"schema-faq-answer\">A DDoS t\u00e1mad\u00e1s c\u00e9lja, hogy egy weboldalt vagy h\u00e1l\u00f3zatot el\u00e9rhetetlenn\u00e9 tegyen. A t\u00e1mad\u00f3 ezt \u00fagy \u00e9ri el, hogy t\u00falterheli a c\u00e9lt forgalommal vagy k\u00e9r\u00e9sekkel.<\/p>\n<\/div>\n<div id=\"faq-question-1659357876258\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Meddig tartanak a DDoS t\u00e1mad\u00e1sok?<\/strong>\n<p class=\"schema-faq-answer\">A DDoS t\u00e1mad\u00e1sok \u00f3r\u00e1kig vagy ak\u00e1r napokig is tarthatnak. A t\u00e1mad\u00e1s id\u0151tartama a t\u00e1mad\u00f3 c\u00e9ljait\u00f3l \u00e9s az el\u00e9rhet\u0151 er\u0151forr\u00e1sokt\u00f3l f\u00fcgg.<\/p>\n<\/div>\n<div id=\"faq-question-1659357899750\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Ellophat-e inform\u00e1ci\u00f3t a DDoS?<\/strong>\n<p class=\"schema-faq-answer\">A DDoS t\u00e1mad\u00e1sok nem tudnak inform\u00e1ci\u00f3t ellopni. Azonban a DDoS t\u00e1mad\u00e1sok felhaszn\u00e1lhat\u00f3k arra, hogy elvonj\u00e1k az informatikai szem\u00e9lyzet figyelm\u00e9t, mik\u00f6zben egy m\u00e1sik t\u00edpus\u00fa t\u00e1mad\u00e1s, p\u00e9ld\u00e1ul egy adatv\u00e9delmi incidens, v\u00e9grehajt\u00e1sra ker\u00fcl.<\/p>\n<\/div>\n<div id=\"faq-question-1659357945762\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">V\u00e9d-e a VPN a DDoS t\u00e1mad\u00e1sok ellen?<\/strong>\n<p class=\"schema-faq-answer\">Egy VPN seg\u00edthet megv\u00e9deni az eszk\u00f6zeit a DDoS t\u00e1mad\u00e1sokt\u00f3l az\u00e1ltal, hogy elrejti az IP-c\u00edmeket, \u00edgy a t\u00e1mad\u00f3k nem tal\u00e1lhatj\u00e1k meg a h\u00e1l\u00f3zat\u00e1t. Azonban nem \u00e1ll\u00edtja meg teljesen a t\u00e1mad\u00e1st.<\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A Sz\u00e9tosztott Szolg\u00e1ltat\u00e1smegtagad\u00e1s (DDoS) t\u00e1mad\u00e1s egy rosszindulat\u00fa k\u00eds\u00e9rlet arra, hogy egy online szolg\u00e1ltat\u00e1st el\u00e9rhetetlenn\u00e9 tegyenek az\u00e1ltal, hogy t\u00f6bb forr\u00e1sb\u00f3l sz\u00e1rmaz\u00f3 forgalommal t\u00falterhelik azt. Ez az \u00fatmutat\u00f3 megtan\u00edtja \u00f6nnek\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/ddos\/mi-az-a-ddos-tamadas\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Mi az a DDoS-t\u00e1mad\u00e1s? A Teljes \u00datmutat\u00f3<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a DDoS Attack? A Complete Guide | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/ddos\/mi-az-a-ddos-tamadas\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/ddos\/mi-az-a-ddos-tamadas\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T12:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"453\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"What is a DDoS Attack? The Complete Guide\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"wordCount\":2607,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"articleSection\":[\"ddos\"],\"inLanguage\":\"hu\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"name\":\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"description\":\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\"}],\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"width\":850,\"height\":453,\"caption\":\"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a DDoS Attack? The Complete Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"name\":\"Is it easy to make a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"name\":\"What is the goal of a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"name\":\"How long do DDoS attacks last?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"name\":\"Can DDoS steal information?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"position\":5,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"name\":\"Does VPN protect from DDoS?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mi az a DDoS t\u00e1mad\u00e1s? Teljes \u00fatmutat\u00f3 | securitybriefing.net","description":"A DDoS t\u00e1mad\u00e1sok sz\u00e1ma n\u00f6vekszik. Ismerje meg, mik ezek, hogyan m\u0171k\u00f6dnek, \u00e9s hogyan v\u00e9dheti meg szervezet\u00e9t ellen\u00fck.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/ddos\/mi-az-a-ddos-tamadas\/","og_locale":"hu_HU","og_type":"article","og_title":"What is a DDoS Attack? A Complete Guide | securitybriefing.net","og_description":"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.","og_url":"https:\/\/securitybriefing.net\/hu\/ddos\/mi-az-a-ddos-tamadas\/","og_site_name":"Security Briefing","article_published_time":"2022-08-01T12:38:43+00:00","og_image":[{"width":850,"height":453,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"13 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"What is a DDoS Attack? The Complete Guide","datePublished":"2022-08-01T12:38:43+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"wordCount":2607,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","articleSection":["ddos"],"inLanguage":"hu"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","name":"Mi az a DDoS t\u00e1mad\u00e1s? Teljes \u00fatmutat\u00f3 | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","datePublished":"2022-08-01T12:38:43+00:00","description":"A DDoS t\u00e1mad\u00e1sok sz\u00e1ma n\u00f6vekszik. Ismerje meg, mik ezek, hogyan m\u0171k\u00f6dnek, \u00e9s hogyan v\u00e9dheti meg szervezet\u00e9t ellen\u00fck.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762"}],"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","width":850,"height":453,"caption":"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What is a DDoS Attack? The Complete Guide"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","position":1,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","name":"K\u00f6nny\u0171 DDoS t\u00e1mad\u00e1st v\u00e9grehajtani?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","position":2,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","name":"Mi a c\u00e9lja a DDoS t\u00e1mad\u00e1snak?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","position":3,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","name":"Meddig tartanak a DDoS t\u00e1mad\u00e1sok?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","position":4,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","name":"Ellophat-e inform\u00e1ci\u00f3t a DDoS?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","position":5,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","name":"V\u00e9d-e a VPN a DDoS t\u00e1mad\u00e1sok ellen?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.","inLanguage":"hu"},"inLanguage":"hu"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/477"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}