{"id":474,"date":"2022-08-01T12:38:43","date_gmt":"2022-08-01T12:38:43","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=474"},"modified":"2022-08-01T12:38:43","modified_gmt":"2022-08-01T12:38:43","slug":"tan-cong-ddos-la-gi","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/tan-cong-ddos\/tan-cong-ddos-la-gi\/","title":{"rendered":"T\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec? H\u01b0\u1edbng d\u1eabn \u0111\u1ea7y \u0111\u1ee7"},"content":{"rendered":"<p>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng T\u1eeb ch\u1ed1i D\u1ecbch v\u1ee5 Ph\u00e2n t\u00e1n (DDoS) l\u00e0 m\u1ed9t n\u1ed7 l\u1ef1c \u0111\u1ed9c h\u1ea1i nh\u1eb1m l\u00e0m cho m\u1ed9t d\u1ecbch v\u1ee5 tr\u1ef1c tuy\u1ebfn kh\u00f4ng kh\u1ea3 d\u1ee5ng b\u1eb1ng c\u00e1ch \u00e1p \u0111\u1ea3o n\u00f3 v\u1edbi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp t\u1eeb nhi\u1ec1u ngu\u1ed3n. H\u01b0\u1edbng d\u1eabn n\u00e0y s\u1ebd d\u1ea1y b\u1ea1n m\u1ecdi th\u1ee9 b\u1ea1n c\u1ea7n bi\u1ebft v\u1ec1 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS, bao g\u1ed3m c\u00e1ch ph\u00f2ng th\u1ee7 ch\u1ed1ng l\u1ea1i ch\u00fang.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-ddos-attack\"><strong>T\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec?<\/strong><\/h2>\n\n\n<p>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 m\u1ed9t d\u1ea1ng hack b\u1ea5t h\u1ee3p ph\u00e1p trong \u0111\u00f3 m\u1ed9t l\u01b0\u1ee3ng l\u1edbn l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111\u01b0\u1ee3c h\u01b0\u1edbng \u0111\u1ebfn m\u1ed9t m\u00e1y ch\u1ee7 \u0111\u1ec3 ng\u0103n m\u1ecdi ng\u01b0\u1eddi truy c\u1eadp c\u00e1c d\u1ecbch v\u1ee5 v\u00e0 trang web tr\u1ef1c tuy\u1ebfn li\u00ean k\u1ebft.<\/p>\n\n\n\n<p>C\u00f3 nhi\u1ec1u l\u00fd do t\u1ea1i sao m\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 mu\u1ed1n kh\u1edfi \u0111\u1ed9ng m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS. M\u1ed9t s\u1ed1 ng\u01b0\u1eddi c\u00f3 th\u1ec3 l\u00e0 kh\u00e1ch h\u00e0ng t\u1ee9c gi\u1eadn ho\u1eb7c hacktivist mu\u1ed1n \u0111\u00e1nh s\u1eadp m\u00e1y ch\u1ee7 c\u1ee7a m\u1ed9t c\u00f4ng ty ch\u1ec9 \u0111\u1ec3 \u0111\u01b0a ra tuy\u00ean b\u1ed1. Nh\u1eefng ng\u01b0\u1eddi kh\u00e1c c\u00f3 th\u1ec3 l\u00e0m \u0111i\u1ec1u \u0111\u00f3 \u0111\u1ec3 gi\u1ea3i tr\u00ed ho\u1eb7c \u0111\u1ec3 ph\u1ea3n \u0111\u1ed1i \u0111i\u1ec1u g\u00ec \u0111\u00f3.<\/p>\n\n\n\n<p>M\u1eb7c d\u00f9 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u00e1nh c\u1eafp t\u1eeb m\u1ed9t c\u00f4ng ty, ch\u00fang ch\u1ee7 y\u1ebfu l\u00e0 m\u1ed9t m\u1ed1i lo ng\u1ea1i t\u00e0i ch\u00ednh. V\u00ed d\u1ee5, ho\u1ea1t \u0111\u1ed9ng internet c\u1ee7a m\u1ed9t c\u00f4ng ty b\u1ecb gi\u00e1n \u0111o\u1ea1n ho\u1eb7c d\u1eebng l\u1ea1i b\u1edfi m\u1ed9t \u0111\u1ed1i th\u1ee7 c\u1ea1nh tranh \u0111\u1ec3 \u0111\u00e1nh c\u1eafp kh\u00e1ch h\u00e0ng. M\u1ed9t v\u00ed d\u1ee5 kh\u00e1c l\u00e0 t\u1ed1ng ti\u1ec1n, trong \u0111\u00f3 k\u1ebb t\u1ea5n c\u00f4ng nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o m\u1ed9t c\u00f4ng ty v\u00e0 c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ho\u1eb7c ransomware tr\u00ean m\u00e1y ch\u1ee7 c\u1ee7a h\u1ecd tr\u01b0\u1edbc khi y\u00eau c\u1ea7u h\u1ecd tr\u1ea3 m\u1ed9t kho\u1ea3n ti\u1ec1n chu\u1ed9c l\u1edbn \u0111\u1ec3 kh\u1eafc ph\u1ee5c thi\u1ec7t h\u1ea1i.<\/p>\n\n\n\n<p>Th\u1eadt kh\u00f4ng may, c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS \u0111\u00e3 tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn h\u01a1n v\u00e0 m\u1ea1nh m\u1ebd h\u01a1n trong nh\u1eefng n\u0103m g\u1ea7n \u0111\u00e2y khi internet ng\u00e0y c\u00e0ng tr\u1edf n\u00ean quan tr\u1ecdng \u0111\u1ed1i v\u1edbi doanh nghi\u1ec7p v\u00e0 c\u00e1 nh\u00e2n. S\u1ef1 gia t\u0103ng c\u1ee7a c\u00e1c thi\u1ebft b\u1ecb IoT c\u0169ng \u0111\u00f3ng m\u1ed9t vai tr\u00f2 trong vi\u1ec7c n\u00e0y, v\u00ec nhi\u1ec1u thi\u1ebft b\u1ecb n\u00e0y d\u1ec5 b\u1ecb hack v\u00e0 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 t\u1ea1o ra c\u00e1c botnet t\u1ea5n c\u00f4ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-a-ddos-attack-work\"><strong>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o?<\/strong><\/h2>\n\n\n<p>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS x\u1ea3y ra khi nhi\u1ec1u m\u00e1y t\u00ednh b\u1ecb hack \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 g\u1eedi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111\u1ebfn m\u1ed9t trang web ho\u1eb7c m\u00e1y ch\u1ee7, khi\u1ebfn trang web ho\u1eb7c m\u00e1y ch\u1ee7 kh\u00f3 ho\u1ea1t \u0111\u1ed9ng. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1eb1ng c\u00e1ch \u0111i\u1ec1u khi\u1ec3n t\u1eeb xa c\u00e1c m\u00e1y t\u00ednh n\u00e0y b\u1eb1ng m\u1ed9t botnet, l\u00e0 m\u1ed9t t\u1eadp h\u1ee3p c\u00e1c bot.<\/p>\n\n\n\n<p>Sau khi thi\u1ebft l\u1eadp m\u1ed9t botnet, k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 g\u1eedi l\u1ec7nh t\u1eeb xa \u0111\u1ebfn t\u1eebng bot \u0111\u1ec3 ch\u1ec9 \u0111\u1ea1o m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 l\u00e0m qu\u00e1 t\u1ea3i \u0111\u1ecba ch\u1ec9 IP c\u1ee7a m\u1ee5c ti\u00eau v\u1edbi c\u00e1c y\u00eau c\u1ea7u, d\u1eabn \u0111\u1ebfn m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 tr\u00ean l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp th\u00f4ng th\u01b0\u1eddng.<\/p>\n\n\n\n<p>B\u1edfi v\u00ec m\u1ed7i bot l\u00e0 m\u1ed9t thi\u1ebft b\u1ecb th\u1ef1c t\u1ebf tr\u00ean internet, c\u00f3 th\u1ec3 kh\u00f3 x\u00e1c \u0111\u1ecbnh li\u1ec7u l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp b\u1ea5t th\u01b0\u1eddng c\u00f3 \u0111\u01b0\u1ee3c mong \u0111\u1ee3i hay kh\u00f4ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-identify-a-ddos-attack\"><strong>C\u00e1ch nh\u1eadn di\u1ec7n m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS<\/strong><\/h2>\n\n\n<p>\u0110i\u1ec1u kh\u00f3 kh\u0103n nh\u1ea5t v\u1ec1 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 b\u1ea1n kh\u00f4ng th\u1ec3 th\u1ea5y b\u1ea5t k\u1ef3 d\u1ea5u hi\u1ec7u c\u1ea3nh b\u00e1o n\u00e0o. Th\u00f4ng th\u01b0\u1eddng, c\u00e1c nh\u00f3m hack n\u1ed5i ti\u1ebfng s\u1ebd \u0111\u01b0a ra c\u1ea3nh b\u00e1o tr\u01b0\u1edbc khi h\u1ecd kh\u1edfi \u0111\u1ed9ng m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng, nh\u01b0ng h\u1ea7u h\u1ebft c\u00e1c k\u1ebb t\u1ea5n c\u00f4ng s\u1ebd ch\u1ec9 ra l\u1ec7nh t\u1ea5n c\u00f4ng m\u00e0 kh\u00f4ng c\u00f3 th\u00f4ng b\u00e1o.<\/p>\n\n\n\n<p>M\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 kh\u00f4ng lu\u00f4n n\u00f3i v\u1edbi b\u1ea1n n\u1ebfu h\u1ecd kh\u00f4ng th\u00edch n\u1ed9i dung tr\u00ean trang web c\u1ee7a b\u1ea1n. H\u1ecd c\u00f3 th\u1ec3 s\u1ee3 n\u00f3i b\u1ea5t c\u1ee9 \u0111i\u1ec1u g\u00ec. Nh\u01b0ng n\u1ebfu c\u00f3 \u0111i\u1ec1u g\u00ec \u0111\u00f3 sai, h\u1ecd s\u1ebd n\u00f3i v\u1edbi b\u1ea1n. H\u1ecd c\u00f3 th\u1ec3 kh\u00f4ng n\u00f3i v\u1edbi b\u1ea1n ngay t\u1eeb \u0111\u1ea7u, nh\u01b0ng h\u1ecd s\u1ebd n\u00f3i sau. \u0110\u00f3 l\u00e0 v\u00ec m\u1ecdi ng\u01b0\u1eddi th\u01b0\u1eddng kh\u00f4ng ki\u1ec3m tra trang web c\u1ee7a b\u1ea1n nh\u01b0 b\u1ea1n l\u00e0m. B\u1ea1n ngh\u0129 m\u1ecdi th\u1ee9 \u0111\u1ec1u \u1ed5n, nh\u01b0ng \u0111\u00f4i khi kh\u00f4ng ph\u1ea3i v\u1eady. B\u1ea1n c\u1ea7n c\u1ea9n th\u1eadn v\u00ec \u0111\u00f4i khi c\u00f3 nh\u1eefng v\u1ea5n \u0111\u1ec1 m\u00e0 b\u1ea1n kh\u00f4ng th\u1ec3 th\u1ea5y ngay t\u1eeb \u0111\u1ea7u.<\/p>\n\n\n\n<p>T\u00ecm ngu\u1ed3n g\u1ed1c c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng T\u1eeb ch\u1ed1i D\u1ecbch v\u1ee5 Ph\u00e2n t\u00e1n c\u00f3 th\u1ec3 kh\u00f3 kh\u0103n. Cu\u1ed9c t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 k\u00e9o d\u00e0i nhi\u1ec1u gi\u1edd v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 kh\u00f4ng th\u1ec3 d\u1eebng n\u00f3 ngay l\u1eadp t\u1ee9c. \u0110i\u1ec1u n\u00e0y c\u00f3 ngh\u0129a l\u00e0 b\u1ea1n s\u1ebd m\u1ea5t doanh thu v\u00e0 d\u1ecbch v\u1ee5 trong nhi\u1ec1u gi\u1edd.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"mitigate-a-ddos-attack\"><strong>Gi\u1ea3m thi\u1ec3u m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS<\/strong><\/h3>\n\n\n<p>C\u00e1ch t\u1ed1t nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 trang web c\u1ee7a b\u1ea1n kh\u1ecfi m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 ph\u00e1t hi\u1ec7n n\u00f3 c\u00e0ng s\u1edbm c\u00e0ng t\u1ed1t. N\u1ebfu b\u1ea1n nh\u1eadn th\u1ea5y b\u1ea5t k\u1ef3 d\u1ea5u hi\u1ec7u n\u00e0o sau \u0111\u00e2y, \u0111i\u1ec1u \u0111\u00f3 c\u00f3 ngh\u0129a l\u00e0 b\u1ea1n \u0111ang b\u1ecb t\u1ea5n c\u00f4ng DDoS:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>T\u1ea3i ch\u1eadm\u00a0<\/li>\n<li>M\u00e1y ch\u1ee7 ph\u1ea3n h\u1ed3i v\u1edbi m\u00e3 503<\/li>\n<li>Th\u1eddi gian TTL h\u1ebft h\u1ea1n<\/li>\n<li>S\u1ed1 l\u01b0\u1ee3ng l\u1edbn b\u00ecnh lu\u1eadn spam<\/li>\n<li>M\u1ea1ng \u0111\u1ed9t ng\u1ed9t b\u1ecb ng\u1eaft k\u1ebft n\u1ed1i<\/li>\n<li>C\u00f3 c\u00e1c m\u1eabu l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111i\u1ec3n h\u00ecnh, nh\u01b0 t\u0103ng \u0111\u1ed9t bi\u1ebfn v\u00e0o nh\u1eefng gi\u1edd l\u1ebb<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-most-common-types-of-ddos-attacks\"><strong>C\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng DDoS ph\u1ed5 bi\u1ebfn nh\u1ea5t<\/strong><\/h2>\n\n\n<p>C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS \u0111\u01b0\u1ee3c t\u1ed9i ph\u1ea1m s\u1eed d\u1ee5ng \u0111\u1ec3 nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o nhi\u1ec1u k\u1ebft n\u1ed1i m\u1ea1ng kh\u00e1c nhau. Hi\u1ec3u bi\u1ebft c\u01a1 b\u1ea3n v\u1ec1 m\u1ea1ng l\u00e0 c\u1ea7n thi\u1ebft \u0111\u1ec3 hi\u1ec3u c\u00e1ch ho\u1ea1t \u0111\u1ed9ng c\u1ee7a m\u1ed9t s\u1ed1 lo\u1ea1i t\u1ea5n c\u00f4ng DDoS.<\/p>\n\n\n\n<p>M\u1ed9t k\u1ebft n\u1ed1i Internet c\u00f3 nhi\u1ec1u ph\u1ea7n ri\u00eang bi\u1ec7t, c\u00f2n \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 c\u00e1c l\u1edbp. M\u1ed7i l\u1edbp c\u00f3 m\u1ed9t m\u1ee5c \u0111\u00edch c\u1ee5 th\u1ec3.<\/p>\n\n\n\n<p>M\u00f4 h\u00ecnh OSI l\u00e0 m\u1ed9t c\u00e1ch \u0111\u1ed3 h\u1ecda \u0111\u1ec3 bi\u1ec3u di\u1ec5n c\u00e1ch c\u00e1c ph\u1ea7n kh\u00e1c nhau c\u1ee7a m\u1ed9t m\u1ea1ng \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i. Tuy nhi\u00ean, Internet hi\u1ec7n t\u1ea1i d\u1ef1a tr\u00ean m\u1ed9t h\u1ec7 th\u1ed1ng \u0111\u01a1n gi\u1ea3n h\u01a1n g\u1ecdi l\u00e0 TCP\/IP. M\u00f4 h\u00ecnh OSI v\u1eabn \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng v\u00ec n\u00f3 gi\u00fap m\u1ecdi ng\u01b0\u1eddi th\u1ea5y v\u00e0 hi\u1ec3u c\u00e1ch m\u1ea1ng ho\u1ea1t \u0111\u1ed9ng v\u00e0 kh\u1eafc ph\u1ee5c b\u1ea5t k\u1ef3 v\u1ea5n \u0111\u1ec1 n\u00e0o c\u00f3 th\u1ec3 x\u1ea3y ra.<\/p>\n\n\n\n<p>C\u00f3 ba lo\u1ea1i t\u1ea5n c\u00f4ng DDoS. Lo\u1ea1i \u0111\u1ea7u ti\u00ean l\u00e0 khi m\u1ed9t thi\u1ebft b\u1ecb b\u1ecb qu\u00e1 t\u1ea3i v\u1edbi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp. Lo\u1ea1i th\u1ee9 hai l\u00e0 khi m\u1ed9t m\u1ea1ng b\u1ecb qu\u00e1 t\u1ea3i v\u1edbi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp. Lo\u1ea1i th\u1ee9 ba x\u1ea3y ra khi m\u1ed9t k\u1ebb t\u1ea5n c\u00f4ng s\u1eed d\u1ee5ng nhi\u1ec1u h\u01a1n m\u1ed9t vector t\u1ea5n c\u00f4ng \u0111\u1ec3 \u00e1p \u0111\u1ea3o m\u1ee5c ti\u00eau c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-481\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/osi-model-layers.png\" alt=\"C\u00e1c l\u1edbp c\u1ee7a m\u00f4 h\u00ecnh OSI\" width=\"825\" height=\"737\" \/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"application-layer-attacks\"><strong>T\u1ea5n c\u00f4ng l\u1edbp \u1ee9ng d\u1ee5ng<\/strong><\/h3>\n\n\n<p>Tr\u1ea3i nghi\u1ec7m ng\u01b0\u1eddi d\u00f9ng b\u1eaft \u0111\u1ea7u khi m\u1ed9t ng\u01b0\u1eddi l\u1ea7n \u0111\u1ea7u ti\u00ean li\u00ean h\u1ec7 v\u1edbi internet. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u1edbp \u1ee9ng d\u1ee5ng ng\u0103n ph\u1ea7n m\u1ec1m ho\u1ea1t \u0111\u1ed9ng \u0111\u1ec3 m\u1ecdi ng\u01b0\u1eddi kh\u00f4ng th\u1ec3 xem b\u1ea5t k\u1ef3 n\u1ed9i dung n\u00e0o. M\u00e1y ch\u1ee7 web th\u01b0\u1eddng b\u1ecb nh\u1eafm m\u1ee5c ti\u00eau trong c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y, nh\u01b0ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh kh\u00e1c nh\u01b0 d\u1ecbch v\u1ee5 tho\u1ea1i SIP v\u00e0 BGP c\u0169ng c\u00f3 th\u1ec3 b\u1ecb t\u1ea5n c\u00f4ng.<\/p>\n\n\n\n<p>Giao th\u1ee9c TCP\/IP c\u00f3 th\u1ec3 truy\u1ec1n d\u1eef li\u1ec7u gi\u1eefa c\u00e1c thi\u1ebft b\u1ecb tr\u00ean m\u1ed9t m\u1ea1ng. Nh\u01b0ng giao th\u1ee9c n\u00e0y r\u1ea5t d\u1ec5 b\u1ecb t\u1ea5n c\u00f4ng DDoS. \u0110i\u1ec1u n\u00e0y c\u00f3 ngh\u0129a l\u00e0 ai \u0111\u00f3 c\u00f3 th\u1ec3 t\u1ea5n c\u00f4ng thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n v\u00e0 ng\u0103n n\u00f3 ho\u1ea1t \u0111\u1ed9ng b\u1eb1ng c\u00e1ch g\u1eedi m\u1ed9t l\u01b0\u1ee3ng l\u1edbn d\u1eef li\u1ec7u c\u00f9ng m\u1ed9t l\u00fac. M\u1eb7c d\u00f9 m\u1ed9t s\u1ed1 ng\u01b0\u1eddi c\u00f3 th\u1ec3 c\u1ea3m th\u1ea5y kh\u00f3 ch\u1ecbu v\u00ec \u0111i\u1ec1u n\u00e0y, nh\u01b0ng vi\u1ec7c s\u1eed d\u1ee5ng m\u1ed9t giao th\u1ee9c an to\u00e0n cho c\u00e1c giao d\u1ecbch tr\u1ef1c tuy\u1ebfn v\u1eabn r\u1ea5t quan tr\u1ecdng. S\u1eed d\u1ee5ng m\u00e3 h\u00f3a cho giao ti\u1ebfp b\u1ea3o v\u1ec7 c\u1ea3 hai b\u00ean kh\u1ecfi b\u1ecb ch\u1eb7n v\u00e0 nghe l\u00e9n. H\u1ea7u h\u1ebft c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS s\u1eed d\u1ee5ng \u00edt g\u00f3i d\u1eef li\u1ec7u h\u01a1n m\u1ed7i gi\u00e2y.<\/p>\n\n\n\n<p>Cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y s\u1ebd y\u00eau c\u1ea7u s\u1eed d\u1ee5ng giao th\u1ee9c c\u1ee5 th\u1ec3 c\u1ee7a \u1ee9ng d\u1ee5ng b\u1ecb nh\u1eafm m\u1ee5c ti\u00eau, c\u00f3 th\u1ec3 li\u00ean quan \u0111\u1ebfn c\u00e1c th\u1ee7 t\u1ee5c b\u1eaft tay v\u00e0 tu\u00e2n th\u1ee7. C\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng n\u00e0y s\u1ebd ch\u1ee7 y\u1ebfu \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1edfi c\u00e1c thi\u1ebft b\u1ecb IoT kh\u00f4ng th\u1ec3 d\u1ec5 d\u00e0ng b\u1ecb gi\u1ea3 m\u1ea1o.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"example-of-application%25c2%25a0ddos-attacks\"><strong>V\u00ed d\u1ee5 v\u1ec1 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS \u1ee9ng d\u1ee5ng<\/strong><\/h3>\n\n\n<p><strong>T\u1ea5n c\u00f4ng HTTP flood<\/strong><\/p>\n\n\n\n<p>\u0110\u00e2y l\u00e0 m\u1ed9t m\u00e1y ch\u1ee7 ch\u1ea5p nh\u1eadn c\u00e1c y\u00eau c\u1ea7u t\u1eeb nhi\u1ec1u m\u00e1y t\u00ednh kh\u00e1c nhau. Ph\u01b0\u01a1ng ph\u00e1p n\u00e0y, gi\u1ed1ng nh\u01b0 l\u00e0m m\u1edbi m\u1ed9t trang web tr\u00ean nhi\u1ec1u PC c\u00f9ng m\u1ed9t l\u00fac, g\u1eedi nhi\u1ec1u y\u00eau c\u1ea7u HTTP \u0111\u1ebfn m\u00e1y ch\u1ee7, l\u00e0m qu\u00e1 t\u1ea3i n\u00f3. Cu\u1ed9c t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 \u0111\u01a1n gi\u1ea3n ho\u1eb7c ph\u1ee9c t\u1ea1p.<\/p>\n\n\n\n<p>M\u1ed9t URL c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c truy c\u1eadp b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng c\u00f9ng m\u1ed9t ph\u1ea1m vi \u0111\u1ecba ch\u1ec9 IP t\u1ea5n c\u00f4ng, c\u00e1c trang gi\u1edbi thi\u1ec7u v\u00e0 t\u00e1c nh\u00e2n ng\u01b0\u1eddi d\u00f9ng. \u0110i\u1ec1u n\u00e0y gi\u00fap k\u1ebb t\u1ea5n c\u00f4ng d\u1ec5 d\u00e0ng t\u00ecm v\u00e0 s\u1eed d\u1ee5ng URL m\u1ee5c ti\u00eau. C\u00e1c bi\u1ebfn th\u1ec3 ph\u1ee9c t\u1ea1p h\u01a1n c\u00f3 th\u1ec3 nh\u1eafm m\u1ee5c ti\u00eau m\u1ed9t lo\u1ea1t c\u00e1c URL s\u1eed d\u1ee5ng c\u00e1c trang gi\u1edbi thi\u1ec7u v\u00e0 t\u00e1c nh\u00e2n ng\u01b0\u1eddi d\u00f9ng kh\u00e1c nhau \u0111\u1ec3 truy c\u1eadp ch\u00fang.<\/p>\n\n\n\n<p><strong>T\u1ea5n c\u00f4ng giao th\u1ee9c<\/strong><\/p>\n\n\n\n<p>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng Flood Giao th\u1ee9c l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS g\u1eedi nhi\u1ec1u l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111\u1ebfn m\u1ed9t d\u1ecbch v\u1ee5 ho\u1eb7c m\u1ea1ng, l\u00e0m cho n\u00f3 kh\u00f3 s\u1eed d\u1ee5ng. Khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng trong ng\u0103n x\u1ebfp giao th\u1ee9c l\u1edbp ba v\u00e0 l\u1edbp b\u1ed1n.<\/p>\n\n\n\n<p>C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS th\u01b0\u1eddng nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o nhi\u1ec1u giao th\u1ee9c kh\u00f4ng an to\u00e0n, kh\u00f4ng \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 v\u00e0 kh\u00f4ng \u0111\u01b0\u1ee3c b\u1ea3o m\u1eadt. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS th\u01b0\u1eddng nh\u1eafm v\u00e0o c\u00e1c ti\u00eau chu\u1ea9n giao ti\u1ebfp Internet. \u0110i\u1ec1u n\u00e0y l\u00e0 do nhi\u1ec1u h\u1ec7 th\u1ed1ng n\u00e0y \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng tr\u00ean to\u00e0n th\u1ebf gi\u1edbi v\u00e0 r\u1ea5t kh\u00f3 \u0111\u1ec3 s\u1eeda \u0111\u1ed5i ch\u00fang nhanh ch\u00f3ng. H\u01a1n n\u1eefa, v\u00ec nhi\u1ec1u giao th\u1ee9c c\u00f3 s\u1ef1 ph\u1ee9c t\u1ea1p v\u1ed1n c\u00f3 ngay c\u1ea3 sau khi ch\u00fang \u0111\u01b0\u1ee3c ki\u1ec3m tra l\u1ea1i \u0111\u1ec3 gi\u1ea3i quy\u1ebft c\u00e1c l\u1ed7i hi\u1ec7n t\u1ea1i, c\u00e1c l\u1ed7 h\u1ed5ng m\u1edbi xu\u1ea5t hi\u1ec7n cho ph\u00e9p c\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng giao th\u1ee9c m\u1edbi c\u0169ng nh\u01b0 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-protocol-ddos-attacks\"><strong>V\u00ed d\u1ee5 v\u1ec1 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS giao th\u1ee9c<\/strong><\/h4>\n\n\n<p><strong>(BGP) chi\u1ebfm \u0111o\u1ea1t<\/strong><\/p>\n\n\n\n<p>C\u00e1c d\u1ecbch v\u1ee5 d\u1ef1a tr\u00ean \u0111\u00e1m m\u00e2y ch\u1ee9a nhi\u1ec1u th\u00f4ng tin c\u00f3 gi\u00e1 tr\u1ecb m\u00e0 k\u1ebb tr\u1ed9m d\u1eef li\u1ec7u mu\u1ed1n. \u0110i\u1ec1u n\u00e0y l\u00e0 do h\u1ecd c\u00f3 th\u1ec3 l\u1ea5y th\u00f4ng tin h\u1eefu \u00edch t\u1eeb c\u00e1c d\u1ecbch v\u1ee5 n\u00e0y. N\u1ebfu c\u00f3 m\u1ed9t v\u1ee5 vi ph\u1ea1m d\u1eef li\u1ec7u t\u1eeb m\u1ed9t trong nh\u1eefng nh\u00e0 cung c\u1ea5p n\u00e0y, n\u00f3 c\u00f3 th\u1ec3 r\u1ea5t nguy hi\u1ec3m. Ai \u0111\u00f3 c\u00f3 th\u1ec3 kh\u1edfi \u0111\u1ed9ng m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS ch\u1ed1ng l\u1ea1i m\u1ed9t c\u00f4ng ty s\u1eed d\u1ee5ng c\u00e1c giao th\u1ee9c cao h\u01a1n \u0111\u00e1m m\u00e2y. BGP (Border Gateway Protocol) truy\u1ec1n \u0111\u1ea1t th\u00f4ng tin v\u1ec1 kh\u00f4ng gian \u0111\u1ecba ch\u1ec9 m\u1ea1ng.<\/p>\n\n\n\n<p>C\u00e1c b\u1ea3n c\u1eadp nh\u1eadt BGP \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 chia s\u1ebb th\u00f4ng tin gi\u1eefa c\u00e1c m\u1ea1ng. N\u1ebfu ai \u0111\u00f3 g\u1eedi m\u1ed9t b\u1ea3n c\u1eadp nh\u1eadt gi\u1ea3, l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp c\u00f3 th\u1ec3 \u0111i \u0111\u1ebfn m\u1ed9t m\u1ea1ng kh\u00e1c. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 ti\u00eau t\u1ed1n t\u00e0i nguy\u00ean v\u00e0 l\u00e0m cho m\u1ecdi th\u1ee9 b\u1ecb t\u1eafc ngh\u1ebdn. N\u00e2ng c\u1ea5p l\u00ean m\u1ed9t phi\u00ean b\u1ea3n BGP an to\u00e0n h\u01a1n s\u1ebd t\u1ed1n th\u1eddi gian v\u00e0 chi ph\u00ed v\u00ec h\u00e0ng ch\u1ee5c ng\u00e0n nh\u00e0 \u0111i\u1ec1u h\u00e0nh m\u1ea1ng tr\u00ean to\u00e0n th\u1ebf gi\u1edbi s\u1eed d\u1ee5ng n\u00f3.<\/p>\n\n\n\n<p><strong>T\u1ea5n c\u00f4ng SYN flood<\/strong><\/p>\n\n\n\n<p>M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng TCP SYN Flood gi\u1ed1ng nh\u01b0 m\u1ed9t nh\u00e2n vi\u00ean cung c\u1ea5p h\u00e0ng nh\u1eadn \u0111\u01a1n \u0111\u1eb7t h\u00e0ng t\u1eeb ph\u00eda tr\u01b0\u1edbc c\u1eeda h\u00e0ng.<\/p>\n\n\n\n<p>Ng\u01b0\u1eddi l\u00e1i xe nh\u1eadn g\u00f3i h\u00e0ng, ch\u1edd x\u00e1c nh\u1eadn, v\u00e0 sau \u0111\u00f3 mang n\u00f3 ra ph\u00eda tr\u01b0\u1edbc sau khi nh\u1eadn \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u. Nh\u00e2n vi\u00ean nh\u1eadn \u0111\u01b0\u1ee3c nhi\u1ec1u y\u00eau c\u1ea7u giao h\u00e0ng m\u00e0 kh\u00f4ng c\u00f3 x\u00e1c nh\u1eadn cho \u0111\u1ebfn khi h\u1ecd kh\u00f4ng th\u1ec3 mang th\u00eam b\u1ea5t k\u1ef3 l\u00f4 h\u00e0ng n\u00e0o n\u1eefa. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 khi\u1ebfn h\u1ecd b\u1ecb qu\u00e1 t\u1ea3i.<\/p>\n\n\n\n<p>Trong cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y, k\u1ebb t\u1ea5n c\u00f4ng g\u1eedi nhi\u1ec1u g\u00f3i tin \u0111\u1ebfn n\u1ea1n nh\u00e2n. C\u00e1c g\u00f3i tin c\u00f3 \u0111\u1ecba ch\u1ec9 gi\u1ea3. H\u1ecd khai th\u00e1c th\u1ee7 t\u1ee5c b\u1eaft tay m\u00e0 hai m\u00e1y t\u00ednh s\u1eed d\u1ee5ng \u0111\u1ec3 b\u1eaft \u0111\u1ea7u m\u1ed9t k\u1ebft n\u1ed1i m\u1ea1ng.<\/p>\n\n\n\n<p>M\u1ee5c ti\u00eau c\u1ee7a k\u1ebb x\u00e2m nh\u1eadp l\u00e0 cho ph\u00e9p c\u00e0ng nhi\u1ec1u n\u1ed7 l\u1ef1c k\u1ebft n\u1ed1i c\u00e0ng t\u1ed1t tr\u01b0\u1edbc khi t\u1eaft c\u00e1c t\u00e0i nguy\u00ean c\u1ee7a n\u00f3.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"volumetric-attacks\"><strong>T\u1ea5n c\u00f4ng kh\u1ed1i l\u01b0\u1ee3ng l\u1edbn<\/strong><\/h3>\n\n\n<p>Cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y nh\u1eb1m s\u1eed d\u1ee5ng t\u1ea5t c\u1ea3 b\u0103ng th\u00f4ng internet gi\u1eefa m\u1ee5c ti\u00eau v\u00e0 ph\u1ea7n c\u00f2n l\u1ea1i c\u1ee7a th\u1ebf gi\u1edbi. D\u1eef li\u1ec7u \u0111\u01b0\u1ee3c g\u1eedi \u0111\u1ebfn m\u1ee5c ti\u00eau theo m\u1ed9t trong hai c\u00e1ch: khu\u1ebfch \u0111\u1ea1i ho\u1eb7c m\u1ed9t ph\u01b0\u01a1ng ph\u00e1p kh\u00e1c \u0111\u1ec3 t\u1ea1o ra l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp l\u1edbn, ch\u1eb3ng h\u1ea1n nh\u01b0 y\u00eau c\u1ea7u t\u1eeb m\u1ed9t botnet.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"examples-of-volumetric-attacks\"><strong>V\u00ed d\u1ee5 v\u1ec1 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng kh\u1ed1i l\u01b0\u1ee3ng l\u1edbn<\/strong><\/h4>\n\n\n<p><strong>Khu\u1ebfch \u0111\u1ea1i DNS<\/strong><\/p>\n\n\n\n<p>K\u1ebb t\u1ea5n c\u00f4ng g\u1eedi c\u00e1c truy v\u1ea5n nh\u1ecf \u0111\u1ebfn m\u00e1y ch\u1ee7 DNS, nh\u01b0ng m\u00e1y ch\u1ee7 khu\u1ebfch \u0111\u1ea1i truy v\u1ea5n th\u00e0nh m\u1ed9t t\u1ea3i tr\u1ecdng l\u1edbn h\u01a1n nhi\u1ec1u l\u00e0m s\u1eadp m\u00e1y ch\u1ee7 c\u1ee7a n\u1ea1n nh\u00e2n. Lo\u1ea1i t\u1ea5n c\u00f4ng n\u00e0y \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS khu\u1ebfch \u0111\u1ea1i.<\/p>\n\n\n\n<p>DNS Amplification l\u00e0 m\u1ed9t lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng trong \u0111\u00f3 k\u1ebb t\u1ea5n c\u00f4ng g\u1eedi tin nh\u1eafn \u0111\u1ebfn m\u1ea1ng c\u1ee7a n\u1ea1n nh\u00e2n b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng c\u00e1c m\u00e1y ch\u1ee7 DNS. C\u00e1c g\u00f3i tin c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c khu\u1ebfch \u0111\u1ea1i, l\u00e0m cho ch\u00fang kh\u00f3 b\u1ecb ch\u1eb7n h\u01a1n.<\/p>\n\n\n\n<p>DNS amplification l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng trong \u0111\u00f3 ai \u0111\u00f3 l\u1eeba m\u1ed9t b\u1ed9 gi\u1ea3i DNS g\u1eedi cho h\u1ecd nhi\u1ec1u th\u00f4ng tin. \u0110i\u1ec1u n\u00e0y x\u1ea3y ra khi h\u1ecd g\u1eedi m\u1ed9t y\u00eau c\u1ea7u gi\u1ea3 \u0111\u1ebfn b\u1ed9 gi\u1ea3i DNS v\u1edbi m\u1ed9t \u0111\u1ecba ch\u1ec9 kh\u00f4ng th\u1ef1c. V\u00ec c\u00f3 r\u1ea5t nhi\u1ec1u ng\u01b0\u1eddi l\u00e0m \u0111i\u1ec1u n\u00e0y v\u00e0 c\u00f3 r\u1ea5t nhi\u1ec1u b\u1ed9 gi\u1ea3i DNS, m\u1ea1ng c\u1ee7a n\u1ea1n nh\u00e2n c\u00f3 th\u1ec3 nhanh ch\u00f3ng b\u1ecb qu\u00e1 t\u1ea3i.<\/p>\n\n\n\n<p><strong>Gi\u1ea3m thi\u1ec3u m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS<\/strong><\/p>\n\n\n\n<p>Khi m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS x\u1ea3y ra, m\u1ecdi ng\u01b0\u1eddi th\u01b0\u1eddng b\u1ed1i r\u1ed1i. Nhi\u1ec1u h\u1ec7 th\u1ed1ng b\u1ea3o m\u1eadt kh\u00f4ng cung c\u1ea5p th\u00f4ng tin chi ti\u1ebft v\u1ec1 l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111\u1ebfn. \u0110i\u1ec1u duy nh\u1ea5t ch\u1eafc ch\u1eafn v\u1ec1 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 c\u00e1c \u1ee9ng d\u1ee5ng tr\u1ef1c tuy\u1ebfn c\u1ee7a kh\u00e1ch h\u00e0ng c\u1ee7a b\u1ea1n \u0111\u00e3 kh\u00f4ng th\u1ec3 truy c\u1eadp \u0111\u01b0\u1ee3c do m\u1ed9t s\u1ef1 c\u1ed1 m\u1ea1ng. V\u1ea5n \u0111\u1ec1 tr\u1edf n\u00ean t\u1ed3i t\u1ec7 h\u01a1n n\u1ebfu m\u1ed9t thi\u1ebft b\u1ecb b\u1ea3o m\u1eadt t\u1ea1i ch\u1ed7 b\u1ea3o v\u1ec7 m\u1ea1ng b\u1ecb nh\u1eafm m\u1ee5c ti\u00eau.<\/p>\n\n\n\n<p>S\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m c\u0169 kh\u00f4ng an to\u00e0n n\u1ebfu b\u1ea1n c\u00f3 m\u1ed9t m\u00e1y t\u00ednh s\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m c\u0169. \u0110i\u1ec1u n\u00e0y l\u00e0 do c\u00f3 th\u1ec3 c\u00f3 c\u00e1c r\u1ee7i ro b\u1ea3o m\u1eadt m\u00e0 b\u1ea1n kh\u00f4ng bi\u1ebft. B\u1ea1n c\u1ea7n c\u1eadp nh\u1eadt m\u00e1y t\u00ednh c\u1ee7a m\u00ecnh th\u01b0\u1eddng xuy\u00ean v\u1edbi c\u00e1c b\u1ea3n v\u00e1 v\u00e0 ph\u1ea7n m\u1ec1m m\u1edbi nh\u1ea5t \u0111\u1ec3 kh\u1eafc ph\u1ee5c \u0111i\u1ec1u n\u00e0y. Tuy nhi\u00ean, \u0111i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 kh\u00f3 kh\u0103n v\u00ec c\u00e1c l\u1ed7 h\u1ed5ng m\u1edbi li\u00ean t\u1ee5c \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n. Tin t\u1eb7c c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng n\u00e0y \u0111\u1ec3 hack m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u1ee7a b\u1ea1n.<\/p>\n\n\n\n<p>M\u1ed9t s\u1ed1 k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS \u0111\u1ec3 \u0111\u1ea1t \u0111\u01b0\u1ee3c m\u1ee5c ti\u00eau c\u1ee7a h\u1ecd. Tuy nhi\u00ean, c\u00f3 m\u1ed9t s\u1ed1 tr\u1edf ng\u1ea1i. C\u00e1c gi\u1ea3i ph\u00e1p b\u1ea3o m\u1eadt t\u1ea1i ch\u1ed7 kh\u00f4ng th\u1ec3 ng\u0103n ch\u1eb7n m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng x\u1ea3y ra. Tr\u01b0\u1edbc khi cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u1ebfn m\u1ed9t thi\u1ebft b\u1ecb l\u1ecdc t\u1ea1i ch\u1ed7, c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng kh\u1ed1i l\u01b0\u1ee3ng l\u1edbn c\u00f3 th\u1ec3 l\u00e0m t\u1eafc ngh\u1ebdn \u0111\u01b0\u1eddng \u1ed1ng internet \u0111\u1ebfn v\u00e0 khi\u1ebfn ISP th\u01b0\u1ee3ng ngu\u1ed3n b\u1ecb qu\u00e1 t\u1ea3i v\u00e0 ch\u1eb7n t\u1ea5t c\u1ea3 l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111\u1ebfn, c\u1eaft \u0111\u1ee9t m\u1ea1ng m\u1ee5c ti\u00eau kh\u1ecfi Internet.\u00a0<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-defend-against-ddos-attacks\">C\u00e1ch ph\u00f2ng th\u1ee7 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS<\/h2>\n\n\n<p>C\u00f3 nhi\u1ec1u c\u00e1ch \u0111\u1ec3 ph\u00f2ng th\u1ee7 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS. \u0110i\u1ec1u quan tr\u1ecdng nh\u1ea5t l\u00e0 c\u00f3 m\u1ed9t k\u1ebf ho\u1ea1ch tr\u01b0\u1edbc khi b\u1ea1n b\u1ecb t\u1ea5n c\u00f4ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"increase-bandwidth\">T\u0103ng b\u0103ng th\u00f4ng<\/h3>\n\n\n<p>\u0110\u1ea3m b\u1ea3o r\u1eb1ng c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng l\u01b0u tr\u1eef c\u1ee7a b\u1ea1n c\u00f3 th\u1ec3 x\u1eed l\u00fd m\u1ed9t l\u01b0\u1ee3ng l\u1edbn l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp l\u00e0 m\u1ed9t trong nh\u1eefng \u0111i\u1ec1u quan tr\u1ecdng nh\u1ea5t b\u1ea1n c\u00f3 th\u1ec3 l\u00e0m \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS. \u0110i\u1ec1u n\u00e0y c\u00f3 ngh\u0129a l\u00e0 b\u1ea1n n\u00ean l\u1eadp k\u1ebf ho\u1ea1ch cho c\u00e1c \u0111\u1ed9t bi\u1ebfn l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp b\u1ea5t ng\u1edd, c\u00f3 th\u1ec3 x\u1ea3y ra khi ai \u0111\u00f3 hack v\u00e0o trang web c\u1ee7a b\u1ea1n. Tuy nhi\u00ean, t\u0103ng b\u0103ng th\u00f4ng kh\u00f4ng ph\u1ea3i l\u00fac n\u00e0o c\u0169ng c\u00f3 ngh\u0129a l\u00e0 b\u1ea1n s\u1ebd \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS.<\/p>\n\n\n\n<p>Khi b\u1ea1n t\u0103ng b\u0103ng th\u00f4ng, vi\u1ec7c t\u1ea5n c\u00f4ng v\u00e0o trang web c\u1ee7a b\u1ea1n tr\u1edf n\u00ean kh\u00f3 kh\u0103n h\u01a1n \u0111\u1ed1i v\u1edbi k\u1ebb t\u1ea5n c\u00f4ng. Tuy nhi\u00ean, b\u1ea1n c\u00f3 th\u1ec3 c\u1ea3i thi\u1ec7n b\u1ea3o m\u1eadt trang web c\u1ee7a m\u00ecnh b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng nhi\u1ec1u bi\u1ec7n ph\u00e1p kh\u00e1c nhau.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"set-serverlevel-ddos-mitigation\">Thi\u1ebft l\u1eadp gi\u1ea3m thi\u1ec3u DDoS \u1edf m\u1ee9c m\u00e1y ch\u1ee7<\/h3>\n\n\n<p>M\u1ed9t s\u1ed1 nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 l\u01b0u tr\u1eef web c\u00f3 ph\u1ea7n m\u1ec1m gi\u1ea3m thi\u1ec3u DDoS \u1edf m\u1ee9c m\u00e1y ch\u1ee7. Ch\u1ee9c n\u0103ng n\u00e0y kh\u00f4ng ph\u1ea3i l\u00fac n\u00e0o c\u0169ng c\u00f3 s\u1eb5n, v\u00ec v\u1eady b\u1ea1n n\u00ean h\u1ecfi nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 l\u01b0u tr\u1eef web c\u1ee7a m\u00ecnh n\u1ebfu h\u1ecd cung c\u1ea5p n\u00f3. N\u1ebfu h\u1ecd c\u00f3, h\u00e3y t\u00ecm hi\u1ec3u xem \u0111\u00f3 l\u00e0 m\u1ed9t d\u1ecbch v\u1ee5 mi\u1ec5n ph\u00ed hay c\u00f3 ph\u00ed. S\u1ef1 s\u1eb5n c\u00f3 c\u1ee7a d\u1ecbch v\u1ee5 n\u00e0y ph\u1ee5 thu\u1ed9c v\u00e0o nh\u00e0 cung c\u1ea5p v\u00e0 g\u00f3i l\u01b0u tr\u1eef.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"move-to-cloudbased-hosting\">Chuy\u1ec3n sang l\u01b0u tr\u1eef d\u1ef1a tr\u00ean \u0111\u00e1m m\u00e2y<\/h3>\n\n\n<p>L\u01b0u tr\u1eef d\u1ef1a tr\u00ean \u0111\u00e1m m\u00e2y l\u00e0 m\u1ed9t lo\u1ea1i l\u01b0u tr\u1eef web s\u1eed d\u1ee5ng \u0111i\u1ec7n to\u00e1n \u0111\u00e1m m\u00e2y \u0111\u1ec3 cung c\u1ea5p d\u1ecbch v\u1ee5 c\u1ee7a n\u00f3. L\u01b0u tr\u1eef d\u1ef1a tr\u00ean \u0111\u00e1m m\u00e2y c\u00f3 th\u1ec3 m\u1edf r\u1ed9ng h\u01a1n v\u00e0 c\u00f3 th\u1ec3 \u0111\u00e1ng tin c\u1eady h\u01a1n so v\u1edbi l\u01b0u tr\u1eef web truy\u1ec1n th\u1ed1ng.<\/p>\n\n\n\n<p>M\u1ed9t trong nh\u1eefng l\u1ee3i \u00edch c\u1ee7a l\u01b0u tr\u1eef d\u1ef1a tr\u00ean \u0111\u00e1m m\u00e2y l\u00e0 n\u00f3 c\u00f3 th\u1ec3 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS t\u1ed1t h\u01a1n. \u0110i\u1ec1u n\u00e0y l\u00e0 do c\u00e1c nh\u00e0 cung c\u1ea5p \u0111\u00e1m m\u00e2y c\u00f3 t\u00e0i nguy\u00ean \u0111\u1ec3 h\u1ea5p th\u1ee5 v\u00e0 chuy\u1ec3n h\u01b0\u1edbng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rate-limiting\">Gi\u1edbi h\u1ea1n t\u1ed1c \u0111\u1ed9<\/h3>\n\n\n<p>Gi\u1edbi h\u1ea1n s\u1ed1 l\u01b0\u1ee3ng y\u00eau c\u1ea7u m\u00e0 m\u1ed9t m\u00e1y ch\u1ee7 s\u1ebd ch\u1ea5p nh\u1eadn trong m\u1ed9t kho\u1ea3ng th\u1eddi gian nh\u1ea5t \u0111\u1ecbnh c\u00f3 th\u1ec3 gi\u00fap ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5. Gi\u1edbi h\u1ea1n t\u1ed1c \u0111\u1ed9 c\u00f3 th\u1ec3 gi\u00fap ng\u0103n ch\u1eb7n c\u00e1c c\u00f4ng c\u1ee5 l\u1ea5y d\u1eef li\u1ec7u web kh\u1ecfi \u0111\u00e1nh c\u1eafp th\u00f4ng tin v\u00e0 gi\u1ea3m c\u00e1c l\u1ea7n \u0111\u0103ng nh\u1eadp brute force, nh\u01b0ng n\u00f3 c\u00f3 th\u1ec3 kh\u00f4ng \u0111\u1ee7 \u0111\u1ec3 x\u1eed l\u00fd m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS ti\u00ean ti\u1ebfn m\u1ed9t m\u00ecnh.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-content-delivery-network-cdn\">S\u1eed d\u1ee5ng m\u1ea1ng ph\u00e2n ph\u1ed1i n\u1ed9i dung (CDN)<\/h3>\n\n\n<p>M\u1ed9t CDN l\u00e0 m\u1ed9t m\u1ea1ng l\u01b0\u1edbi c\u00e1c m\u00e1y ch\u1ee7 cung c\u1ea5p n\u1ed9i dung cho ng\u01b0\u1eddi d\u00f9ng d\u1ef1a tr\u00ean v\u1ecb tr\u00ed \u0111\u1ecba l\u00fd c\u1ee7a h\u1ecd. CDN c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 c\u1ea3i thi\u1ec7n hi\u1ec7u su\u1ea5t c\u1ee7a c\u00e1c trang web v\u00e0 b\u1ea3o v\u1ec7 ch\u00fang kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS.<\/p>\n\n\n\n<p>Khi b\u1ea1n s\u1eed d\u1ee5ng m\u1ed9t CDN, n\u1ed9i dung t\u0129nh c\u1ee7a trang web c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c l\u01b0u tr\u1eef tr\u00ean c\u00e1c m\u00e1y ch\u1ee7 c\u1ee7a CDN. N\u1ed9i dung n\u00e0y sau \u0111\u00f3 \u0111\u01b0\u1ee3c cung c\u1ea5p cho ng\u01b0\u1eddi d\u00f9ng t\u1eeb m\u00e1y ch\u1ee7 g\u1ea7n nh\u1ea5t v\u1edbi v\u1ecb tr\u00ed c\u1ee7a h\u1ecd. M\u1ed9t CDN c\u00f3 th\u1ec3 gi\u00fap c\u1ea3i thi\u1ec7n hi\u1ec7u su\u1ea5t trang web c\u1ee7a b\u1ea1n v\u00e0 b\u1ea3o v\u1ec7 n\u00f3 kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS.<\/p>\n\n\n\n<p>B\u1ea1n c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng nhi\u1ec1u CDN \u0111\u1ec3 cung c\u1ea5p n\u1ed9i dung t\u0129nh c\u1ee7a trang web c\u1ee7a b\u1ea1n t\u1eeb c\u00e1c m\u00e1y ch\u1ee7 kh\u00e1c nhau tr\u00ean to\u00e0n th\u1ebf gi\u1edbi. \u0110i\u1ec1u n\u00e0y l\u00e0m cho trang web c\u1ee7a b\u1ea1n \u0111\u00e1ng tin c\u1eady h\u01a1n v\u00e0 m\u1ea1nh m\u1ebd h\u01a1n. Ngo\u00e0i ra, s\u1eed d\u1ee5ng gi\u1ea3i ph\u00e1p Multi-CDN, b\u1ea1n c\u00f3 th\u1ec3 t\u1eadn d\u1ee5ng m\u1ed9t m\u1ea1ng l\u01b0\u1edbi c\u00e1c PoP \u0111\u01b0\u1ee3c cung c\u1ea5p b\u1edfi nhi\u1ec1u nh\u00e0 cung c\u1ea5p CDN.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"blackhole-routing\">\u0110\u1ecbnh tuy\u1ebfn blackhole<\/h3>\n\n\n<p>\u0110\u1ecbnh tuy\u1ebfn blackhole l\u00e0 m\u1ed9t c\u00e1ch tuy\u1ec7t v\u1eddi cho c\u00e1c qu\u1ea3n tr\u1ecb vi\u00ean m\u1ea1ng \u0111\u1ec3 x\u1eed l\u00fd g\u1ea7n nh\u01b0 b\u1ea5t k\u1ef3 v\u1ea5n \u0111\u1ec1 n\u00e0o. Khi l\u1ecdc blackhole \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n m\u00e0 kh\u00f4ng c\u00f3 c\u00e1c quy t\u1eafc ph\u1ee9c t\u1ea1p, m\u1ed9t tuy\u1ebfn null \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 t\u1eeb ch\u1ed1i c\u1ea3 l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp t\u1ed1t v\u00e0 x\u1ea5u.<\/p>\n\n\n\n<p>N\u1ebfu m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS nh\u1eafm v\u00e0o m\u1ed9t m\u00e1y ch\u1ee7, nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 Internet (ISP) c\u00f3 th\u1ec3 c\u1ed1 g\u1eafng ng\u0103n ch\u1eb7n cu\u1ed9c t\u1ea5n c\u00f4ng b\u1eb1ng c\u00e1ch chuy\u1ec3n h\u01b0\u1edbng t\u1ea5t c\u1ea3 l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp c\u1ee7a trang web \u0111\u1ebfn m\u1ed9t black hole. \u0110i\u1ec1u n\u00e0y kh\u00f4ng l\u00fd t\u01b0\u1edfng v\u00ec n\u00f3 mang l\u1ea1i cho k\u1ebb t\u1ea5n c\u00f4ng \u0111i\u1ec1u h\u1ecd mu\u1ed1n: l\u00e0m cho m\u1ea1ng kh\u00f4ng th\u1ec3 truy c\u1eadp \u0111\u01b0\u1ee3c.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-a-web-application-firewall-waf\">S\u1eed d\u1ee5ng t\u01b0\u1eddng l\u1eeda \u1ee9ng d\u1ee5ng web (WAF)<\/h3>\n\n\n<p>M\u1ed9t WAF l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m b\u1ea3o m\u1eadt gi\u00fap b\u1ea3o v\u1ec7 c\u00e1c trang web kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng. WAF ki\u1ec3m tra l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp \u0111\u1ebfn v\u00e0 ch\u1eb7n ho\u1eb7c chuy\u1ec3n h\u01b0\u1edbng c\u00e1c y\u00eau c\u1ea7u ch\u1ee9a m\u00e3 \u0111\u1ed9c.<\/p>\n\n\n\n<p>B\u1ea1n c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng m\u1ed9t WAF \u0111\u1ec3 b\u1ea3o v\u1ec7 trang web c\u1ee7a m\u00ecnh kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS. Tuy nhi\u00ean, b\u1ea1n c\u1ea7n \u0111\u1ea3m b\u1ea3o r\u1eb1ng WAF \u0111\u01b0\u1ee3c c\u1ea5u h\u00ecnh \u0111\u00fang c\u00e1ch. N\u1ebfu kh\u00f4ng, n\u00f3 c\u00f3 th\u1ec3 ch\u1eb7n l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp h\u1ee3p ph\u00e1p.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-your-network-for-unusual-activity\">Gi\u00e1m s\u00e1t m\u1ea1ng c\u1ee7a b\u1ea1n \u0111\u1ec3 ph\u00e1t hi\u1ec7n ho\u1ea1t \u0111\u1ed9ng b\u1ea5t th\u01b0\u1eddng<\/h3>\n\n\n<p>B\u1ea1n n\u00ean gi\u00e1m s\u00e1t m\u1ea1ng c\u1ee7a m\u00ecnh \u0111\u1ec3 ph\u00e1t hi\u1ec7n ho\u1ea1t \u0111\u1ed9ng b\u1ea5t th\u01b0\u1eddng. \u0110i\u1ec1u n\u00e0y bao g\u1ed3m vi\u1ec7c gi\u00e1m s\u00e1t s\u1ef1 gia t\u0103ng \u0111\u1ed9t ng\u1ed9t trong l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp v\u00e0 c\u00e1c y\u00eau c\u1ea7u k\u1ef3 l\u1ea1.<\/p>\n\n\n\n<p>N\u1ebfu b\u1ea1n nh\u1eadn th\u1ea5y b\u1ea5t k\u1ef3 ho\u1ea1t \u0111\u1ed9ng b\u1ea5t th\u01b0\u1eddng n\u00e0o, b\u1ea1n n\u00ean \u0111i\u1ec1u tra ngay l\u1eadp t\u1ee9c. N\u00f3 c\u00f3 th\u1ec3 l\u00e0 d\u1ea5u hi\u1ec7u cho th\u1ea5y trang web c\u1ee7a b\u1ea1n \u0111ang b\u1ecb t\u1ea5n c\u00f4ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"in-a-nutshell\"><strong>T\u00f3m l\u1ea1i<\/strong><\/h2>\n\n\n<p>C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS c\u00f3 th\u1ec3 g\u00e2y thi\u1ec7t h\u1ea1i cho doanh nghi\u1ec7p. Ch\u00fang c\u00f3 th\u1ec3 g\u00e2y ra th\u1eddi gian ng\u1eebng ho\u1ea1t \u0111\u1ed9ng, m\u1ea5t doanh thu v\u00e0 l\u00e0m t\u1ed5n h\u1ea1i \u0111\u1ebfn danh ti\u1ebfng c\u1ee7a b\u1ea1n.<\/p>\n\n\n\n<p>Tuy nhi\u00ean, b\u1ea1n c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 trang web c\u1ee7a m\u00ecnh kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng nhi\u1ec1u bi\u1ec7n ph\u00e1p kh\u00e1c nhau, bao g\u1ed3m gi\u1ea3m thi\u1ec3u DDoS \u1edf m\u1ee9c m\u00e1y ch\u1ee7, l\u01b0u tr\u1eef d\u1ef1a tr\u00ean \u0111\u00e1m m\u00e2y, gi\u1edbi h\u1ea1n t\u1ed1c \u0111\u1ed9 v\u00e0 s\u1eed d\u1ee5ng CDN. B\u1ea1n c\u0169ng n\u00ean gi\u00e1m s\u00e1t m\u1ea1ng c\u1ee7a m\u00ecnh \u0111\u1ec3 ph\u00e1t hi\u1ec7n ho\u1ea1t \u0111\u1ed9ng b\u1ea5t th\u01b0\u1eddng v\u00e0 \u0111i\u1ec1u tra b\u1ea5t k\u1ef3 ho\u1ea1t \u0111\u1ed9ng \u0111\u00e1ng ng\u1edd n\u00e0o ngay l\u1eadp t\u1ee9c.<\/p>\n\n\n\n<p>B\u1eb1ng c\u00e1ch th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc n\u00e0y, b\u1ea1n c\u00f3 th\u1ec3 gi\u00fap \u0111\u1ea3m b\u1ea3o r\u1eb1ng trang web c\u1ee7a b\u1ea1n c\u00f3 s\u1eb5n v\u00e0 c\u00f3 th\u1ec3 truy c\u1eadp \u0111\u01b0\u1ee3c cho ng\u01b0\u1eddi d\u00f9ng c\u1ee7a b\u1ea1n, ngay c\u1ea3 khi \u0111\u1ed1i m\u1eb7t v\u1edbi m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ddos-attack-faqs\">C\u00e2u h\u1ecfi th\u01b0\u1eddng g\u1eb7p v\u1ec1 t\u1ea5n c\u00f4ng DDoS<\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div id=\"faq-question-1659357825601\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">C\u00f3 d\u1ec5 d\u00e0ng th\u1ef1c hi\u1ec7n m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS kh\u00f4ng?<\/strong>\n<p class=\"schema-faq-answer\">C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS c\u00f3 th\u1ec3 ph\u1ee9c t\u1ea1p v\u00e0 \u0111\u00f2i h\u1ecfi m\u1ed9t m\u1ee9c \u0111\u1ed9 chuy\u00ean m\u00f4n k\u1ef9 thu\u1eadt nh\u1ea5t \u0111\u1ecbnh. Tuy nhi\u00ean, c\u00e1c d\u1ecbch v\u1ee5 cho thu\u00ea DDoS hi\u1ec7n nay l\u00e0m cho vi\u1ec7c kh\u1edfi \u0111\u1ed9ng m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng tr\u1edf n\u00ean d\u1ec5 d\u00e0ng cho b\u1ea5t k\u1ef3 ai.<\/p>\n<\/div>\n<div id=\"faq-question-1659357852139\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">M\u1ee5c ti\u00eau c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec?<\/strong>\n<p class=\"schema-faq-answer\">M\u1ee5c ti\u00eau c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 l\u00e0m cho m\u1ed9t trang web ho\u1eb7c m\u1ea1ng kh\u00f4ng kh\u1ea3 d\u1ee5ng. K\u1ebb t\u1ea5n c\u00f4ng l\u00e0m \u0111i\u1ec1u n\u00e0y b\u1eb1ng c\u00e1ch \u00e1p \u0111\u1ea3o m\u1ee5c ti\u00eau v\u1edbi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp ho\u1eb7c y\u00eau c\u1ea7u.<\/p>\n<\/div>\n<div id=\"faq-question-1659357876258\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS k\u00e9o d\u00e0i bao l\u00e2u?<\/strong>\n<p class=\"schema-faq-answer\">C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS c\u00f3 th\u1ec3 k\u00e9o d\u00e0i h\u00e0ng gi\u1edd ho\u1eb7c th\u1eadm ch\u00ed h\u00e0ng ng\u00e0y. Th\u1eddi gian c\u1ee7a cu\u1ed9c t\u1ea5n c\u00f4ng ph\u1ee5 thu\u1ed9c v\u00e0o m\u1ee5c ti\u00eau c\u1ee7a k\u1ebb t\u1ea5n c\u00f4ng v\u00e0 c\u00e1c t\u00e0i nguy\u00ean c\u00f3 s\u1eb5n.<\/p>\n<\/div>\n<div id=\"faq-question-1659357899750\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">DDoS c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin kh\u00f4ng?<\/strong>\n<p class=\"schema-faq-answer\">C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS kh\u00f4ng th\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin. Tuy nhi\u00ean, c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u00e1nh l\u1ea1c h\u01b0\u1edbng s\u1ef1 ch\u00fa \u00fd c\u1ee7a nh\u00e2n vi\u00ean IT trong khi m\u1ed9t lo\u1ea1i t\u1ea5n c\u00f4ng kh\u00e1c, ch\u1eb3ng h\u1ea1n nh\u01b0 vi ph\u1ea1m d\u1eef li\u1ec7u, \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n.<\/p>\n<\/div>\n<div id=\"faq-question-1659357945762\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">VPN c\u00f3 b\u1ea3o v\u1ec7 kh\u1ecfi DDoS kh\u00f4ng?<\/strong>\n<p class=\"schema-faq-answer\">M\u1ed9t VPN c\u00f3 th\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS b\u1eb1ng c\u00e1ch \u1ea9n \u0111\u1ecba ch\u1ec9 IP c\u1ee7a b\u1ea1n \u0111\u1ec3 k\u1ebb t\u1ea5n c\u00f4ng kh\u00f4ng th\u1ec3 \u0111\u1ecbnh v\u1ecb m\u1ea1ng c\u1ee7a b\u1ea1n. Tuy nhi\u00ean, n\u00f3 s\u1ebd kh\u00f4ng ng\u0103n ch\u1eb7n ho\u00e0n to\u00e0n cu\u1ed9c t\u1ea5n c\u00f4ng.<\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>T\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 ph\u00e2n t\u00e1n (DDoS) l\u00e0 m\u1ed9t n\u1ed7 l\u1ef1c \u0111\u1ed9c h\u1ea1i nh\u1eb1m l\u00e0m cho m\u1ed9t d\u1ecbch v\u1ee5 tr\u1ef1c tuy\u1ebfn kh\u00f4ng kh\u1ea3 d\u1ee5ng b\u1eb1ng c\u00e1ch l\u00e0m qu\u00e1 t\u1ea3i n\u00f3 v\u1edbi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp t\u1eeb nhi\u1ec1u ngu\u1ed3n. H\u01b0\u1edbng d\u1eabn n\u00e0y s\u1ebd h\u01b0\u1edbng d\u1eabn b\u1ea1n\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/tan-cong-ddos\/tan-cong-ddos-la-gi\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">T\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec? H\u01b0\u1edbng d\u1eabn \u0111\u1ea7y \u0111\u1ee7<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a DDoS Attack? A Complete Guide | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/tan-cong-ddos\/tan-cong-ddos-la-gi\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/tan-cong-ddos\/tan-cong-ddos-la-gi\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T12:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"453\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"What is a DDoS Attack? The Complete Guide\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"},\"wordCount\":2607,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"articleSection\":[\"ddos\"],\"inLanguage\":\"vi\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\",\"name\":\"What is a DDoS Attack? A Complete Guide | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"datePublished\":\"2022-08-01T12:38:43+00:00\",\"description\":\"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\"},{\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\"}],\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg\",\"width\":850,\"height\":453,\"caption\":\"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a DDoS Attack? The Complete Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601\",\"name\":\"Is it easy to make a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139\",\"name\":\"What is the goal of a DDoS attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258\",\"name\":\"How long do DDoS attacks last?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750\",\"name\":\"Can DDoS steal information?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"position\":5,\"url\":\"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762\",\"name\":\"Does VPN protect from DDoS?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.\",\"inLanguage\":\"vi\"},\"inLanguage\":\"vi\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec? H\u01b0\u1edbng d\u1eabn ho\u00e0n ch\u1ec9nh | securitybriefing.net","description":"C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS \u0111ang gia t\u0103ng. T\u00ecm hi\u1ec3u ch\u00fang l\u00e0 g\u00ec, c\u00e1ch ch\u00fang ho\u1ea1t \u0111\u1ed9ng v\u00e0 c\u00e1ch b\u1ea1n c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 t\u1ed5 ch\u1ee9c c\u1ee7a m\u00ecnh kh\u1ecfi ch\u00fang.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/tan-cong-ddos\/tan-cong-ddos-la-gi\/","og_locale":"vi_VN","og_type":"article","og_title":"What is a DDoS Attack? A Complete Guide | securitybriefing.net","og_description":"DDoS attacks are on the rise. Learn what they are, how they work, and how you can protect your organization from them.","og_url":"https:\/\/securitybriefing.net\/vi\/tan-cong-ddos\/tan-cong-ddos-la-gi\/","og_site_name":"Security Briefing","article_published_time":"2022-08-01T12:38:43+00:00","og_image":[{"width":850,"height":453,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"13 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"What is a DDoS Attack? The Complete Guide","datePublished":"2022-08-01T12:38:43+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"},"wordCount":2607,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","articleSection":["ddos"],"inLanguage":"vi"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/","name":"T\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec? H\u01b0\u1edbng d\u1eabn ho\u00e0n ch\u1ec9nh | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","datePublished":"2022-08-01T12:38:43+00:00","description":"C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS \u0111ang gia t\u0103ng. T\u00ecm hi\u1ec3u ch\u00fang l\u00e0 g\u00ec, c\u00e1ch ch\u00fang ho\u1ea1t \u0111\u1ed9ng v\u00e0 c\u00e1ch b\u1ea1n c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 t\u1ed5 ch\u1ee9c c\u1ee7a m\u00ecnh kh\u1ecfi ch\u00fang.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750"},{"@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762"}],"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/What-is-a-DDoS-Attack-The-Complete-Guide-to-Understanding-and-Defending-Against-Distributed-Denial-of-Service-Attacks-2.jpg","width":850,"height":453,"caption":"What is a DDoS Attack? The Complete Guide to Understanding and Defending Against Distributed Denial of Service Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What is a DDoS Attack? The Complete Guide"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","position":1,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357825601","name":"C\u00f3 d\u1ec5 d\u00e0ng th\u1ef1c hi\u1ec7n m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS kh\u00f4ng?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can be complex and require a certain level of technical expertise. However, DDoS-for-hire services now make it easy for anyone to launch an attack.","inLanguage":"vi"},"inLanguage":"vi"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","position":2,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357852139","name":"M\u1ee5c ti\u00eau c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A DDoS attack aims to make a website or network unavailable. The attacker does this by overwhelming the target with traffic or requests.","inLanguage":"vi"},"inLanguage":"vi"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","position":3,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357876258","name":"C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS k\u00e9o d\u00e0i bao l\u00e2u?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks can last for hours or even days. The duration of the attack depends on the attacker's goals and the available resources.","inLanguage":"vi"},"inLanguage":"vi"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","position":4,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357899750","name":"DDoS c\u00f3 th\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin kh\u00f4ng?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"DDoS attacks cannot steal information. However, DDoS attacks can be used to distract the attention of IT staff while another type of attack, such as a data breach, is carried out.","inLanguage":"vi"},"inLanguage":"vi"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","position":5,"url":"https:\/\/securitybriefing.net\/ddos\/what-is-a-ddos-attack\/#faq-question-1659357945762","name":"VPN c\u00f3 b\u1ea3o v\u1ec7 kh\u1ecfi DDoS kh\u00f4ng?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A VPN can help to protect your devices from DDoS attacks by hiding your IP addresses so the attackers can't locate your network. However, it will not stop the attack entirely.","inLanguage":"vi"},"inLanguage":"vi"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/477"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}