{"id":474,"date":"2022-08-01T12:38:43","date_gmt":"2022-08-01T12:38:43","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=474"},"modified":"2022-08-01T12:38:43","modified_gmt":"2022-08-01T12:38:43","slug":"ce-este-un-atac-ddos","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/atac-ddos\/ce-este-un-atac-ddos\/","title":{"rendered":"Ce este un atac DDoS? Ghidul complet"},"content":{"rendered":"<p>Un atac DDoS (Distributed Denial of Service) este o \u00eencercare r\u0103u inten\u021bionat\u0103 de a face un serviciu online indisponibil prin cople\u0219irea acestuia cu trafic din mai multe surse. Acest ghid v\u0103 va \u00eenv\u0103\u021ba tot ce trebuie s\u0103 \u0219ti\u021bi despre atacurile DDoS, inclusiv cum s\u0103 v\u0103 ap\u0103ra\u021bi \u00eempotriva lor.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-ddos-attack\"><strong>Ce este un atac DDoS?<\/strong><\/h2>\n\n\n<p>Un atac DDoS este o form\u0103 ilegal\u0103 de hacking \u00een care un flux de trafic este direc\u021bionat c\u0103tre un server pentru a \u00eempiedica accesul persoanelor la serviciile \u0219i site-urile online asociate.<\/p>\n\n\n\n<p>Exist\u0103 multe motive pentru care oamenii ar putea dori s\u0103 lanseze un atac DDoS. Unele persoane pot fi clien\u021bi furio\u0219i sau hacktivi\u0219ti care doresc s\u0103 doboare serverele unei companii doar pentru a face o declara\u021bie. Al\u021bii ar putea face acest lucru pentru distrac\u021bie sau \u00een semn de protest fa\u021b\u0103 de ceva.<\/p>\n\n\n\n<p>De\u0219i atacurile DDoS pot fi folosite pentru a fura de la o companie, acestea reprezint\u0103 \u00een primul r\u00e2nd o problem\u0103 financiar\u0103. De exemplu, activit\u0103\u021bile pe internet ale unei firme sunt \u00eentrerupte sau oprite de un rival pentru a fura clien\u021bi. Un alt exemplu este extorcarea, \u00een care atacatorii \u021bintesc o firm\u0103 \u0219i instaleaz\u0103 hostware sau ransomware pe serverele acesteia \u00eenainte de a-i cere s\u0103 pl\u0103teasc\u0103 o r\u0103scump\u0103rare uria\u0219\u0103 pentru a repara pagubele.<\/p>\n\n\n\n<p>Din p\u0103cate, atacurile DDoS au devenit mai frecvente \u0219i mai puternice \u00een ultimii ani, deoarece internetul a devenit din ce \u00een ce mai esen\u021bial pentru \u00eentreprinderi \u0219i persoane fizice. Cre\u0219terea num\u0103rului de dispozitive IoT a jucat, de asemenea, un rol \u00een acest sens, deoarece multe dintre aceste dispozitive sunt u\u0219or de piratat \u0219i pot fi utilizate pentru a crea botnet-uri care lanseaz\u0103 atacuri.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-a-ddos-attack-work\"><strong>Cum func\u021bioneaz\u0103 un atac DDoS?<\/strong><\/h2>\n\n\n<p>Un atac DDoS este atunci c\u00e2nd mai multe computere piratate sunt folosite pentru a trimite trafic c\u0103tre un site web sau un server, \u00eengreun\u00e2nd func\u021bionarea site-ului sau a serverului. Acest lucru se poate realiza prin controlul de la distan\u021b\u0103 al acestor computere cu ajutorul unui botnet, care este o colec\u021bie de bot-uri.<\/p>\n\n\n\n<p>Dup\u0103 stabilirea unui botnet, atacatorul poate trimite comenzi de la distan\u021b\u0103 fiec\u0103rui bot pentru a direc\u021biona un atac. Acest lucru poate supra\u00eenc\u0103rca adresa IP a \u021bintei cu solicit\u0103ri, rezult\u00e2nd un atac de tip denial-of-service asupra traficului de rutin\u0103.<\/p>\n\n\n\n<p>Deoarece fiecare bot este un dispozitiv real pe internet, poate fi dificil s\u0103 se determine dac\u0103 se a\u0219teapt\u0103 un trafic anormal.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-identify-a-ddos-attack\"><strong>Cum s\u0103 identifica\u021bi un atac DDoS<\/strong><\/h2>\n\n\n<p>Cel mai complicat lucru \u00een leg\u0103tur\u0103 cu un atac DDoS este c\u0103 nu pute\u021bi vedea niciun semn de avertizare. De obicei, colectivele proeminente de hackeri dau avertismente \u00eenainte de a lansa un atac, dar majoritatea atacatorilor vor ordona pur \u0219i simplu un atac f\u0103r\u0103 preaviz.<\/p>\n\n\n\n<p>Este posibil ca oamenii s\u0103 nu v\u0103 spun\u0103 \u00eentotdeauna dac\u0103 nu le place con\u021binutul de pe site-ul dumneavoastr\u0103. S-ar putea s\u0103 le fie team\u0103 s\u0103 spun\u0103 ceva. Dar dac\u0103 ceva nu este \u00een regul\u0103, v\u0103 vor spune. S-ar putea s\u0103 nu v\u0103 spun\u0103 la \u00eenceput, dar v\u0103 vor spune mai t\u00e2rziu. Asta pentru c\u0103, de obicei, oamenii nu-\u021bi verific\u0103 site-ul, a\u0219a cum o faci tu. Tu crezi c\u0103 totul este \u00een regul\u0103, dar uneori nu este a\u0219a. Trebuie s\u0103 fi\u021bi aten\u021bi pentru c\u0103 uneori exist\u0103 probleme pe care nu le pute\u021bi vedea la \u00eenceput.<\/p>\n\n\n\n<p>G\u0103sirea sursei unui atac de tip Distributed Denial of Service poate fi dificil\u0103. Atacul poate continua timp de mai multe ore \u0219i este posibil s\u0103 nu-l pute\u021bi opri imediat. Acest lucru \u00eenseamn\u0103 c\u0103 ve\u021bi pierde venituri \u0219i servicii timp de c\u00e2teva ore.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"mitigate-a-ddos-attack\"><strong>Mitigarea unui atac DDoS<\/strong><\/h3>\n\n\n<p>Cea mai bun\u0103 modalitate de a v\u0103 proteja site-ul web de un atac DDoS este s\u0103 \u00eel detecta\u021bi c\u00e2t mai cur\u00e2nd posibil. Dac\u0103 observa\u021bi oricare dintre urm\u0103toarele semne, \u00eenseamn\u0103 c\u0103 v\u0103 afla\u021bi \u00een prezent sub un atac DDoS:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00cenc\u0103rcare lent\u0103\u00a0<\/li>\n<li>Serverul r\u0103spunde cu un mesaj 503<\/li>\n<li>TTL se opre\u0219te<\/li>\n<li>O cantitate excesiv\u0103 de comentarii spam<\/li>\n<li>Re\u021bea deconectat\u0103 brusc<\/li>\n<li>Exist\u0103 modele tipice \u00een trafic, cum ar fi v\u00e2rfuri la ore ciudate<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-most-common-types-of-ddos-attacks\"><strong>Cele mai frecvente tipuri de atacuri DDoS<\/strong><\/h2>\n\n\n<p>Atacurile DDoS sunt utilizate de infractori pentru a viza o varietate de conexiuni de re\u021bea. \u00cen\u021belegerea elementelor de baz\u0103 ale re\u021belelor este esen\u021bial\u0103 pentru a \u00een\u021belege cum func\u021bioneaz\u0103 mai multe tipuri de atacuri DDoS.<\/p>\n\n\n\n<p>O conexiune la internet are mai multe p\u0103r\u021bi distincte, cunoscute \u0219i sub denumirea de straturi. Fiecare strat are un scop specific.<\/p>\n\n\n\n<p>Modelul OSI este o modalitate grafic\u0103 de a reprezenta modul \u00een care sunt conectate diferitele p\u0103r\u021bi ale unei re\u021bele. Cu toate acestea, internetul actual se bazeaz\u0103 pe un sistem mai simplu numit TCP\/IP. Modelul OSI este \u00eenc\u0103 utilizat deoarece ajut\u0103 oamenii s\u0103 vad\u0103 \u0219i s\u0103 \u00een\u021beleag\u0103 cum func\u021bioneaz\u0103 re\u021belele \u0219i s\u0103 depisteze eventualele probleme.<\/p>\n\n\n\n<p>Exist\u0103 trei tipuri de atacuri DDoS. Primul tip este atunci c\u00e2nd un dispozitiv este supra\u00eenc\u0103rcat cu trafic. Al doilea tip este atunci c\u00e2nd o re\u021bea este supra\u00eenc\u0103rcat\u0103 cu trafic. Al treilea tip se \u00eent\u00e2mpl\u0103 atunci c\u00e2nd un atacator folose\u0219te mai mult de un vector de atac pentru a-\u0219i cople\u0219i \u021binta.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-481\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/osi-model-layers.png\" alt=\"Straturile modelului osi\" width=\"825\" height=\"737\" \/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"application-layer-attacks\"><strong>Atacuri la nivelul aplica\u021biei<\/strong><\/h3>\n\n\n<p>Experien\u021ba utilizatorului \u00eencepe atunci c\u00e2nd o persoan\u0103 intr\u0103 pentru prima dat\u0103 \u00een contact cu internetul. Atacurile DDoS la nivelul aplica\u021biei \u00eempiedic\u0103 software-ul s\u0103 func\u021bioneze, astfel \u00eenc\u00e2t oamenii nu pot vedea niciun con\u021binut. Serverele web sunt adesea vizate de aceste atacuri, dar pot fi atacate \u0219i alte programe, cum ar fi serviciile vocale SIP \u0219i BGP.<\/p>\n\n\n\n<p>Protocolul TCP\/IP poate transfera date \u00eentre dispozitivele dintr-o re\u021bea. Dar acest protocol este foarte vulnerabil la atacurile DDoS. Aceasta \u00eenseamn\u0103 c\u0103 cineva v\u0103 poate ataca dispozitivul \u0219i \u00eel poate opri din func\u021bionare prin trimiterea simultan\u0103 a unei cantit\u0103\u021bi mari de date. Chiar dac\u0103 unii oameni pot fi frustra\u021bi de acest lucru, utilizarea unui protocol securizat pentru tranzac\u021biile online este totu\u0219i esen\u021bial\u0103. Utilizarea cript\u0103rii pentru comunicare protejeaz\u0103 ambele p\u0103r\u021bi de interceptare \u0219i ascultare. Majoritatea atacurilor DDoS utilizeaz\u0103 mult mai pu\u021bine pachete pe secund\u0103.<\/p>\n\n\n\n<p>Acest atac ar necesita utilizarea protocolului specific al aplica\u021biei vizate, care poate implica str\u00e2ngerea de m\u00e2n\u0103 \u0219i conformitatea. Aceste tipuri de atacuri vor fi conduse \u00een principal de gadgeturile IoT care nu pot fi u\u0219or falsificate.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"example-of-application%25c2%25a0ddos-attacks\"><strong>Exemple de atacuri DDoS asupra aplica\u021biilor<\/strong><\/h3>\n\n\n<p><strong>Inunda\u021bie HTTP<\/strong><\/p>\n\n\n\n<p>Acesta este un server care accept\u0103 cereri de la mai multe calculatoare diferite. Aceast\u0103 metod\u0103, precum re\u00eemprosp\u0103tarea unei pagini web pe mai multe PC-uri simultan, trimite multe cereri HTTP c\u0103tre server, supra\u00eenc\u0103rc\u00e2ndu-l. Atacul poate fi simplu sau complex.<\/p>\n\n\n\n<p>Un URL poate fi accesat folosind aceea\u0219i gam\u0103 de adrese IP de atac, site-uri de referin\u021b\u0103 \u0219i agen\u021bi utilizator. Astfel, atacatorului \u00eei este mai u\u0219or s\u0103 g\u0103seasc\u0103 \u0219i s\u0103 utilizeze URL-ul \u021bint\u0103. Variantele mai complexe pot viza o varietate de URL-uri, folosind diverse referin\u021be \u0219i agen\u021bi de utilizator pentru a le accesa.<\/p>\n\n\n\n<p><strong>Atacuri de protocol<\/strong><\/p>\n\n\n\n<p>Un Protocol Flood este un atac DDoS care trimite mult trafic c\u0103tre un serviciu sau o re\u021bea, \u00eengreun\u00e2nd utilizarea acestuia. Exploatarea vulnerabilit\u0103\u021bilor din stiva de protocoale de nivel trei \u0219i patru.<\/p>\n\n\n\n<p>Atacurile DDoS vizeaz\u0103 adesea numeroase protocoale cu grad sc\u0103zut de securitate, neprotejate \u0219i nesecurizate. Atacurile DDoS vizeaz\u0103 de obicei standardele de comunica\u021bii pe internet. Acest lucru se datoreaz\u0103 faptului c\u0103 multe dintre aceste sisteme sunt utilizate la nivel mondial \u0219i este dificil s\u0103 le modific\u0103m rapid. \u00cen plus, deoarece multe protocoale au o complexitate inerent\u0103, chiar \u0219i dup\u0103 ce sunt reexaminate pentru a rezolva problemele actuale, apar noi vulnerabilit\u0103\u021bi care permit noi tipuri de atacuri asupra protocoalelor, precum \u0219i atacuri asupra re\u021belelor.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-protocol-ddos-attacks\"><strong>Exemple de atacuri DDoS de protocol<\/strong><\/h4>\n\n\n<p><strong>deturnare (BGP)<\/strong><\/p>\n\n\n\n<p>Serviciile bazate pe cloud con\u021bin o mul\u021bime de informa\u021bii valoroase pe care ho\u021bii de date le doresc. Acest lucru se datoreaz\u0103 faptului c\u0103 ei pot ob\u021bine informa\u021bii utile de la aceste servicii. Dac\u0103 exist\u0103 o \u00eenc\u0103lcare a securit\u0103\u021bii datelor de la unul dintre ace\u0219ti furnizori, aceasta ar putea fi foarte periculoas\u0103. Cineva poate lansa un atac DDoS \u00eempotriva unei companii folosind protocoale mai \u00eenalte dec\u00e2t cloud-ul. BGP (Border Gateway Protocol) comunic\u0103 informa\u021bii despre spa\u021biile de adrese de re\u021bea.<\/p>\n\n\n\n<p>Actualiz\u0103rile BGP sunt utilizate pentru schimbul de informa\u021bii \u00eentre re\u021bele. Dac\u0103 cineva trimite o actualizare fals\u0103, traficul poate merge c\u0103tre o re\u021bea diferit\u0103. Acest lucru poate duce la utilizarea resurselor \u0219i la congestionarea traficului. Actualizarea la o versiune mai sigur\u0103 a BGP ar lua mult timp \u0219i ar fi costisitoare, deoarece zeci de mii de operatori de re\u021bea din \u00eentreaga lume o utilizeaz\u0103.<\/p>\n\n\n\n<p><strong>Inunda\u021bie SYN<\/strong><\/p>\n\n\n\n<p>Un TCP SYN Flood este ca un lucr\u0103tor care prime\u0219te comenzi din fa\u021ba magazinului.<\/p>\n\n\n\n<p>\u0218oferul prime\u0219te coletul, a\u0219teapt\u0103 verificarea \u0219i apoi \u00eel transport\u0103 \u00een fa\u021b\u0103 dup\u0103 ce prime\u0219te o cerere. Angajatul prime\u0219te numeroase cereri de livrare f\u0103r\u0103 confirmare p\u00e2n\u0103 c\u00e2nd nu mai poate transporta niciun transport. Acest lucru \u00eel poate face s\u0103 devin\u0103 cople\u0219it.<\/p>\n\n\n\n<p>\u00cen acest atac, un atacator trimite mai multe pachete c\u0103tre o victim\u0103. Pachetele au adrese false. Acestea exploateaz\u0103 handshake-ul pe care \u00eel folosesc dou\u0103 computere pentru a \u00eencepe o conexiune la re\u021bea.<\/p>\n\n\n\n<p>Scopul unui intrus este de a permite c\u00e2t mai multe \u00eencerc\u0103ri de conectare \u00eenainte de a-\u0219i \u00eenchide resursele.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"volumetric-attacks\"><strong>Atacuri volumetrice<\/strong><\/h3>\n\n\n<p>Acest atac vizeaz\u0103 utilizarea \u00eentregii l\u0103\u021bimi de band\u0103 de internet dintre \u021bint\u0103 \u0219i restul lumii. Datele sunt trimise c\u0103tre o \u021bint\u0103 \u00een dou\u0103 moduri: prin amplificare sau printr-o alt\u0103 metod\u0103 de generare a unui trafic enorm, cum ar fi solicit\u0103rile din partea unui botnet.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-volumetric-attacks\"><strong>Exemple de atacuri volumetrice<\/strong><\/h4>\n\n\n<p><strong>Amplificarea DNS<\/strong><\/p>\n\n\n\n<p>Atacatorul trimite interog\u0103ri mici c\u0103tre un server DNS, dar serverul amplific\u0103 interogarea \u00eentr-o sarcin\u0103 util\u0103 mult mai mare care blocheaz\u0103 serverele victimei. Acest tip de atac este cunoscut sub numele de atac DDoS de amplificare.<\/p>\n\n\n\n<p>Amplificarea DNS este un tip de atac asupra re\u021belei \u00een care atacatorul trimite mesaje c\u0103tre re\u021beaua victimei folosind servere DNS. Pachetele pot fi amplificate, ceea ce le face mai dificil de blocat.<\/p>\n\n\n\n<p>Amplificarea DNS este un atac prin care cineva p\u0103c\u0103le\u0219te un DNS resolver s\u0103 \u00eei trimit\u0103 o mul\u021bime de informa\u021bii. Acest lucru se \u00eent\u00e2mpl\u0103 atunci c\u00e2nd se trimite o cerere fals\u0103 c\u0103tre rezolvatorul DNS cu o adres\u0103 care nu este real\u0103. Deoarece at\u00e2t de mul\u021bi oameni fac acest lucru \u0219i exist\u0103 at\u00e2t de multe rezolvatoare DNS, re\u021beaua victimei poate fi rapid cople\u0219it\u0103.<\/p>\n\n\n\n<p><strong>Mitigarea unui atac DDoS<\/strong><\/p>\n\n\n\n<p>C\u00e2nd un atac DDoS love\u0219te oamenii, ace\u0219tia sunt adesea confuzi. Multe sisteme de securitate nu ofer\u0103 informa\u021bii detaliate despre traficul care intr\u0103. Singurul lucru sigur despre un atac DDoS este c\u0103 aplica\u021biile online ale clien\u021bilor dvs. au fost inaccesibile din cauza unei \u00eentreruperi a re\u021belei. Problema se agraveaz\u0103 dac\u0103 un dispozitiv de securitate local protejeaz\u0103 re\u021beaua vizat\u0103.<\/p>\n\n\n\n<p>Utilizarea de software vechi nu este sigur\u0103 dac\u0103 ave\u021bi un computer care utilizeaz\u0103 software vechi. Acest lucru se datoreaz\u0103 faptului c\u0103 pot exista riscuri de securitate de care nu sunte\u021bi con\u0219tient. Pentru a remedia aceast\u0103 problem\u0103, trebuie s\u0103 v\u0103 actualiza\u021bi periodic computerul cu cele mai recente patch-uri \u0219i programe. Cu toate acestea, acest lucru poate fi dificil, deoarece sunt descoperite \u00een mod constant noi vulnerabilit\u0103\u021bi. Hackerii se pot folosi de aceste vulnerabilit\u0103\u021bi pentru a v\u0103 sparge computerul \u0219i a v\u0103 fura informa\u021biile.<\/p>\n\n\n\n<p>Unii atacatori pot folosi un DDoS pentru a-\u0219i atinge obiectivele. Cu toate acestea, exist\u0103 mai multe obstacole. Solu\u021biile de securitate instalate la fa\u021ba locului nu pot \u00eempiedica producerea unui atac. \u00cenainte ca atacul s\u0103 ajung\u0103 la un dispozitiv de filtrare local, atacurile volumetrice ar putea bloca conducta de internet de intrare \u0219i ar putea face ca ISP-ul din amonte s\u0103 fie cople\u0219it \u0219i s\u0103 blocheze tot traficul de intrare, t\u0103ind re\u021beaua \u021bint\u0103 de la internet.\u00a0<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-defend-against-ddos-attacks\">Cum s\u0103 v\u0103 ap\u0103ra\u021bi \u00eempotriva atacurilor DDoS<\/h2>\n\n\n<p>Exist\u0103 multe modalit\u0103\u021bi de ap\u0103rare \u00eempotriva atacurilor DDoS. Cel mai important lucru este s\u0103 ave\u021bi un plan \u00eenainte de a fi atacat.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"increase-bandwidth\">Cre\u0219terea l\u0103\u021bimii de band\u0103<\/h3>\n\n\n<p>Unul dintre cele mai importante lucruri pe care le pute\u021bi face pentru a v\u0103 proteja de atacurile DDoS este s\u0103 v\u0103 asigura\u021bi c\u0103 infrastructura dvs. de g\u0103zduire poate gestiona o cantitate mare de trafic. Acest lucru \u00eenseamn\u0103 c\u0103 ar trebui s\u0103 v\u0103 planifica\u021bi pentru v\u00e2rfuri de trafic nea\u0219teptate, care se pot \u00eent\u00e2mpla atunci c\u00e2nd cineva intr\u0103 \u00een site-ul dvs. web. Cu toate acestea, cre\u0219terea l\u0103\u021bimii de band\u0103 nu \u00eenseamn\u0103 \u00eentotdeauna c\u0103 ve\u021bi fi protejat de atacurile DDoS.<\/p>\n\n\n\n<p>Atunci c\u00e2nd v\u0103 m\u0103ri\u021bi l\u0103\u021bimea de band\u0103, atacatorilor le devine mai greu s\u0103 p\u0103trund\u0103 pe site-ul dvs. web. Cu toate acestea, pute\u021bi \u00eembun\u0103t\u0103\u021bi securitatea site-ului dvs. web prin utilizarea unei variet\u0103\u021bi de m\u0103suri.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"set-serverlevel-ddos-mitigation\">Seta\u021bi atenuarea DDoS la nivel de server<\/h3>\n\n\n<p>Unele gazde web dispun de software de atenuare a DDoS la nivelul serverului. Aceast\u0103 func\u021bie nu este \u00eentotdeauna disponibil\u0103, a\u0219a c\u0103 ar trebui s\u0103 \u00eentreba\u021bi gazda dvs. web dac\u0103 o ofer\u0103. Dac\u0103 o fac, afla\u021bi dac\u0103 este un serviciu gratuit sau dac\u0103 se percepe o tax\u0103 pentru acesta. Disponibilitatea acestui serviciu depinde de furnizor \u0219i de planul de g\u0103zduire.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"move-to-cloudbased-hosting\">Trece\u021bi la g\u0103zduire bazat\u0103 pe cloud<\/h3>\n\n\n<p>Cloud-based hosting este un tip de g\u0103zduire web care utilizeaz\u0103 cloud computing pentru a-\u0219i furniza serviciile. Cloud-based hosting este mai scalabil \u0219i poate fi mai fiabil dec\u00e2t web hosting-ul tradi\u021bional.<\/p>\n\n\n\n<p>Unul dintre avantajele g\u0103zduirii bazate pe cloud este c\u0103 poate fi mai rezistent\u0103 la atacurile DDoS. Acest lucru se datoreaz\u0103 faptului c\u0103 furnizorii de cloud au resursele necesare pentru a absorbi \u0219i devia atacurile DDoS.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rate-limiting\">Limitarea ratei<\/h3>\n\n\n<p>Limitarea num\u0103rului de cereri acceptate de un server \u00eentr-un anumit interval de timp poate ajuta la prevenirea atacurilor de tip denial-of-service. Limitarea ratei poate ajuta la oprirea furtului de informa\u021bii de c\u0103tre scraperii web \u0219i la reducerea log\u0103rilor prin for\u021b\u0103 brut\u0103, dar s-ar putea s\u0103 nu fie suficient\u0103 pentru a face fa\u021b\u0103 singur\u0103 unui atac DDoS avansat.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-content-delivery-network-cdn\">Utiliza\u021bi o re\u021bea de distribuire a con\u021binutului (CDN)<\/h3>\n\n\n<p>O CDN este o re\u021bea de servere care furnizeaz\u0103 con\u021binut utilizatorilor \u00een func\u021bie de loca\u021bia lor geografic\u0103. CDN-urile pot fi utilizate pentru a \u00eembun\u0103t\u0103\u021bi performan\u021ba site-urilor web \u0219i pentru a le proteja de atacurile DDoS.<\/p>\n\n\n\n<p>Atunci c\u00e2nd utiliza\u021bi un CDN, con\u021binutul static al site-ului dvs. web este stocat \u00een cache pe serverele CDN-ului. Acest con\u021binut este apoi livrat utilizatorilor de pe serverul cel mai apropiat de loca\u021bia lor. Un CDN v\u0103 poate ajuta s\u0103 \u00eembun\u0103t\u0103\u021bi\u021bi performan\u021ba site-ului dvs. web \u0219i s\u0103 \u00eel proteja\u021bi de atacurile DDoS.<\/p>\n\n\n\n<p>Pute\u021bi utiliza mai multe CDN-uri pentru a furniza con\u021binutul static al site-ului dvs. de pe servere diferite din \u00eentreaga lume. Acest lucru face ca site-ul dvs. web s\u0103 fie mai fiabil \u0219i mai puternic. \u00cen plus, utiliz\u00e2nd o solu\u021bie Multi-CDN, pute\u021bi profita de o re\u021bea de PoPs furnizate de mai mul\u021bi furnizori CDN.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"blackhole-routing\">Traseul g\u0103urii negre<\/h3>\n\n\n<p>O rut\u0103 de tip gaur\u0103 neagr\u0103 este o modalitate excelent\u0103 pentru administratorii de re\u021bea de a rezolva aproape orice problem\u0103. Atunci c\u00e2nd filtrarea blackhole se face f\u0103r\u0103 reguli complexe, se utilizeaz\u0103 o rut\u0103 nul\u0103 pentru a respinge at\u00e2t traficul de re\u021bea bun, c\u00e2t \u0219i cel r\u0103u.<\/p>\n\n\n\n<p>\u00cen cazul \u00een care un atac DDoS vizeaz\u0103 un server, furnizorul de servicii internet (ISP) poate \u00eencerca s\u0103 opreasc\u0103 atacul prin redirec\u021bionarea \u00eentregului trafic al site-ului c\u0103tre o gaur\u0103 neagr\u0103. Acest lucru nu este ideal, deoarece ofer\u0103 atacatorului ceea ce \u00ee\u0219i dore\u0219te: s\u0103 fac\u0103 re\u021beaua inaccesibil\u0103.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-web-application-firewall-waf\">Utiliza\u021bi un firewall pentru aplica\u021bii web (WAF)<\/h3>\n\n\n<p>Un WAF este un tip de software de securitate care ajut\u0103 la protejarea site-urilor web \u00eempotriva atacurilor. WAF-urile inspecteaz\u0103 traficul de intrare \u0219i blocheaz\u0103 sau redirec\u021bioneaz\u0103 cererile care con\u021bin coduri mali\u021bioase.<\/p>\n\n\n\n<p>Pute\u021bi utiliza un WAF pentru a v\u0103 proteja site-ul de atacurile DDoS. Cu toate acestea, trebuie s\u0103 v\u0103 asigura\u021bi c\u0103 WAF-ul este configurat corespunz\u0103tor. \u00cen caz contrar, acesta poate bloca traficul legitim.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-your-network-for-unusual-activity\">Monitoriza\u021bi re\u021beaua pentru activit\u0103\u021bi neobi\u0219nuite<\/h3>\n\n\n<p>Ar trebui s\u0103 v\u0103 monitoriza\u021bi re\u021beaua pentru activit\u0103\u021bi neobi\u0219nuite. Aceasta include monitorizarea cre\u0219terilor bru\u0219te de trafic \u0219i a cererilor ciudate.<\/p>\n\n\n\n<p>Dac\u0103 observa\u021bi orice activitate neobi\u0219nuit\u0103, trebuie s\u0103 o investiga\u021bi imediat. Acesta poate fi un semn c\u0103 site-ul dvs. web este atacat.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"in-a-nutshell\"><strong>Pe scurt<\/strong><\/h2>\n\n\n<p>Atacurile DDoS pot fi devastatoare pentru \u00eentreprinderi. Acestea pot cauza timpi de inactivitate, pierderi de venituri \u0219i v\u0103 pot afecta reputa\u021bia.<\/p>\n\n\n\n<p>Cu toate acestea, v\u0103 pute\u021bi proteja site-ul web de atacurile DDoS prin utilizarea unei variet\u0103\u021bi de m\u0103suri, inclusiv atenuarea DDoS la nivel de server, g\u0103zduirea bazat\u0103 pe cloud, limitarea ratei \u0219i utilizarea unui CDN. De asemenea, ar trebui s\u0103 v\u0103 monitoriza\u021bi re\u021beaua pentru activit\u0103\u021bi neobi\u0219nuite \u0219i s\u0103 investiga\u021bi imediat orice activitate suspect\u0103.<\/p>\n\n\n\n<p>Lu\u00e2nd aceste m\u0103suri, v\u0103 pute\u021bi asigura c\u0103 site-ul dvs. este disponibil \u0219i accesibil utilizatorilor dvs., chiar \u0219i \u00een fa\u021ba unui atac DDoS.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ddos-attack-faqs\">\u00centreb\u0103ri frecvente privind atacurile DDoS<\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div id=\"faq-question-1659357825601\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Este u\u0219or s\u0103 faci un atac DDoS?<\/strong>\n<p class=\"schema-faq-answer\">Atacurile DDoS pot fi complexe \u0219i necesit\u0103 un anumit nivel de expertiz\u0103 tehnic\u0103. Cu toate acestea, serviciile DDoS-for-hire permit acum oricui s\u0103 lanseze cu u\u0219urin\u021b\u0103 un atac.<\/p>\n<\/div>\n<div id=\"faq-question-1659357852139\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Care este scopul unui atac DDoS?<\/strong>\n<p class=\"schema-faq-answer\">Un atac DDoS urm\u0103re\u0219te s\u0103 fac\u0103 indisponibil un site web sau o re\u021bea. Atacatorul face acest lucru prin cople\u0219irea \u021bintei cu trafic sau cereri.<\/p>\n<\/div>\n<div id=\"faq-question-1659357876258\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">C\u00e2t timp dureaz\u0103 atacurile DDoS?<\/strong>\n<p class=\"schema-faq-answer\">Atacurile DDoS pot dura ore sau chiar zile. Durata atacului depinde de obiectivele atacatorului \u0219i de resursele disponibile.<\/p>\n<\/div>\n<div id=\"faq-question-1659357899750\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Poate DDoS s\u0103 fure informa\u021bii?<\/strong>\n<p class=\"schema-faq-answer\">Atacurile DDoS nu pot fura informa\u021bii. Cu toate acestea, atacurile DDoS pot fi utilizate pentru a distrage aten\u021bia personalului IT \u00een timp ce este efectuat un alt tip de atac, cum ar fi o \u00eenc\u0103lcare a securit\u0103\u021bii datelor.<\/p>\n<\/div>\n<div id=\"faq-question-1659357945762\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">VPN-ul protejeaz\u0103 de DDoS?<\/strong>\n<p class=\"schema-faq-answer\">Un VPN v\u0103 poate ajuta s\u0103 v\u0103 proteja\u021bi dispozitivele de atacurile DDoS prin ascunderea adreselor IP, astfel \u00eenc\u00e2t atacatorii s\u0103 nu v\u0103 poat\u0103 localiza re\u021beaua. Cu toate acestea, nu va opri atacul \u00een \u00eentregime.<\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Un atac DDoS (Distributed Denial of Service) este o \u00eencercare r\u0103u inten\u021bionat\u0103 de a face un serviciu online indisponibil prin cople\u0219irea acestuia cu trafic din mai multe surse. Acest ghid v\u0103 va \u00eenv\u0103\u021ba... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/atac-ddos\/ce-este-un-atac-ddos\/\">Continue reading <span class=\"screen-reader-text\">Ce este un atac DDoS? Ghidul complet<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a DDoS Attack? A Complete Guide | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/atac-ddos\/ce-este-un-atac-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/atac-ddos\/ce-este-un-atac-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T12:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"453\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"What is a DDoS Attack? The Complete Guide\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"wordCount\":2607,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"articleSection\":[\"ddos\"],\"inLanguage\":\"ro-RO\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"name\":\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"description\":\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\"}],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"width\":850,\"height\":453,\"caption\":\"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a DDoS Attack? The Complete Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"name\":\"Is it easy to make a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"name\":\"What is the goal of a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"name\":\"How long do DDoS attacks last?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"name\":\"Can DDoS steal information?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"position\":5,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"name\":\"Does VPN protect from DDoS?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ce este un atac DDoS? Un ghid complet | securitybriefing.net","description":"Atacurile DDoS sunt \u00een cre\u0219tere. Afla\u021bi ce sunt acestea, cum func\u021bioneaz\u0103 \u0219i cum v\u0103 pute\u021bi proteja organiza\u021bia \u00eempotriva lor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/atac-ddos\/ce-este-un-atac-ddos\/","og_locale":"ro_RO","og_type":"article","og_title":"What is a DDoS Attack? A Complete Guide | securitybriefing.net","og_description":"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.","og_url":"https:\/\/securitybriefing.net\/ro\/atac-ddos\/ce-este-un-atac-ddos\/","og_site_name":"Security Briefing","article_published_time":"2022-08-01T12:38:43+00:00","og_image":[{"width":850,"height":453,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"13 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"What is a DDoS Attack? The Complete Guide","datePublished":"2022-08-01T12:38:43+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"wordCount":2607,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","articleSection":["ddos"],"inLanguage":"ro-RO"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","name":"Ce este un atac DDoS? Un ghid complet | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","datePublished":"2022-08-01T12:38:43+00:00","description":"Atacurile DDoS sunt \u00een cre\u0219tere. Afla\u021bi ce sunt acestea, cum func\u021bioneaz\u0103 \u0219i cum v\u0103 pute\u021bi proteja organiza\u021bia \u00eempotriva lor.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762"}],"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","width":850,"height":453,"caption":"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What is a DDoS Attack? The Complete Guide"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","position":1,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","name":"Este u\u0219or s\u0103 faci un atac DDoS?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","position":2,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","name":"Care este scopul unui atac DDoS?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","position":3,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","name":"C\u00e2t timp dureaz\u0103 atacurile DDoS?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","position":4,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","name":"Poate DDoS s\u0103 fure informa\u021bii?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","position":5,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","name":"VPN-ul protejeaz\u0103 de DDoS?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/477"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}