{"id":18515,"date":"2021-01-23T21:41:08","date_gmt":"2021-01-23T14:41:08","guid":{"rendered":"https:\/\/speed.family\/?p=18515"},"modified":"2023-07-23T19:53:08","modified_gmt":"2023-07-23T12:53:08","slug":"ddos-la-gi","status":"publish","type":"post","link":"https:\/\/kiencang.net\/ddos-la-gi\/","title":{"rendered":"T\u1ea5n c\u00f4ng DDoS l\u00e0 g\u00ec?"},"content":{"rendered":"\n

T\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 ph\u00e2n t\u00e1n (DDoS \/ Distributed Denial-Of-Service) l\u00e0 m\u1ed9t n\u1ed7 l\u1ef1c \u0111\u1ed9c h\u1ea1i nh\u1eb1m ph\u00e1 v\u1ee1 l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp b\u00ecnh th\u01b0\u1eddng c\u1ee7a m\u1ed9t m\u00e1y ch\u1ee7 (ho\u1eb7c d\u1ecbch v\u1ee5, m\u1ea1ng \u0111\u01b0\u1ee3c nh\u1eafm m\u1ee5c ti\u00eau) b\u1eb1ng c\u00e1ch l\u00e0m qu\u00e1 t\u1ea3i (overwhelming) m\u1ee5c ti\u00eau ho\u1eb7c c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng xung quanh \u0111\u00f3 b\u1eb1ng m\u1ed9t l\u01b0\u1ee3ng l\u1edbn l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp Internet (flood of Internet traffic).<\/p>\n\n\n\n

C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS \u0111\u1ea1t \u0111\u01b0\u1ee3c m\u1ee5c ti\u00eau c\u1ee7a n\u00f3 b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng nhi\u1ec1u h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh b\u1ecb x\u00e2m nh\u1eadp l\u00e0m ngu\u1ed3n l\u01b0u l\u01b0\u1ee3ng t\u1ea5n c\u00f4ng. M\u00e1y (thi\u1ebft b\u1ecb) b\u1ecb khai th\u00e1c \/ l\u1ea1m d\u1ee5ng c\u00f3 th\u1ec3 bao g\u1ed3m m\u00e1y t\u00ednh v\u00e0 c\u00e1c t\u00e0i nguy\u00ean c\u00f3 n\u1ed1i m\u1ea1ng kh\u00e1c nh\u01b0 thi\u1ebft b\u1ecb IoT (Internet of Things \/ Internet v\u1ea1n v\u1eadt).<\/p>\n\n\n\n

\u1ede c\u1ea5p \u0111\u1ed9 cao, m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS gi\u1ed1ng nh\u01b0 m\u1ed9t v\u1ee5 t\u1eafc \u0111\u01b0\u1eddng b\u1ea5t ng\u1edd l\u00e0m t\u1eafc ngh\u1ebdn \u0111\u01b0\u1eddng cao t\u1ed1c b\u1ea1n hay \u0111i, ng\u0103n kh\u00f4ng cho giao th\u00f4ng v\u1eadn h\u00e0nh b\u00ecnh th\u01b0\u1eddng.<\/p>\n\n\n

\n
\"minh
\u00d4 t\u00f4 \u0111\u1ecf \u0111\u01b0\u1ee3c v\u00ed nh\u01b0 l\u00e0 DDoS \u0111ang l\u00e0m t\u1eafc ngh\u1ebdn giao th\u00f4ng c\u1ee7a \u00f4 t\u00f4 xanh b\u00ecnh th\u01b0\u1eddng<\/figcaption><\/figure><\/div>\n\n\n
\n\n\n\n

T\u1ea5n c\u00f4ng DDoS ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o?<\/h2>\n\n\n\n

C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS nh\u1eafm \u0111\u1ebfn m\u1ea1ng c\u00e1c m\u00e1y k\u1ebft n\u1ed1i Internet.<\/p>\n\n\n\n

C\u00e1c m\u1ea1ng n\u00e0y bao g\u1ed3m m\u00e1y t\u00ednh v\u00e0 c\u00e1c thi\u1ebft b\u1ecb kh\u00e1c (ch\u1eb3ng h\u1ea1n nh\u01b0 thi\u1ebft b\u1ecb IoT) \u0111\u00e3 b\u1ecb nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i (malware), cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng \u0111i\u1ec1u khi\u1ec3n ch\u00fang t\u1eeb xa. Nh\u1eefng thi\u1ebft b\u1ecb ri\u00eang l\u1ebb n\u00e0y \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 bot (ho\u1eb7c zombie), v\u00e0 m\u1ed9t nh\u00f3m bot \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 botnet.<\/p>\n\n\n\n

Khi m\u1ea1ng botnet \u0111\u00e3 \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp, k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 ch\u1ec9 \u0111\u1ea1o m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng b\u1eb1ng c\u00e1ch g\u1eedi c\u00e1c h\u01b0\u1edbng d\u1eabn t\u1eeb xa \u0111\u1ebfn t\u1eebng bot.<\/p>\n\n\n\n

Khi m\u00e1y ch\u1ee7 ho\u1eb7c m\u1ea1ng c\u1ee7a n\u1ea1n nh\u00e2n b\u1ecb botnet nh\u1eafm m\u1ee5c ti\u00eau, m\u1ed7i bot s\u1ebd g\u1eedi y\u00eau c\u1ea7u \u0111\u1ebfn \u0111\u1ecba ch\u1ec9 IP c\u1ee7a m\u1ee5c ti\u00eau, \u0111i\u1ec1u n\u00e0y c\u00f3 kh\u1ea3 n\u0103ng khi\u1ebfn m\u00e1y ch\u1ee7 ho\u1eb7c m\u1ea1ng b\u1ecb qu\u00e1 t\u1ea3i, d\u1eabn \u0111\u1ebfn t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 \u0111\u1ed1i v\u1edbi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp b\u00ecnh th\u01b0\u1eddng kh\u00e1c.<\/p>\n\n\n\n

V\u00ec m\u1ed7i bot \u0111\u1ec1u l\u00e0 m\u1ed9t thi\u1ebft b\u1ecb Internet h\u1ee3p ph\u00e1p, vi\u1ec7c t\u00e1ch b\u1ea1ch l\u01b0u l\u01b0\u1ee3ng t\u1ea5n c\u00f4ng kh\u1ecfi l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp th\u00f4ng th\u01b0\u1eddng c\u00f3 th\u1ec3 r\u1ea5t kh\u00f3 kh\u0103n, do v\u1eady vi\u1ec7c ng\u0103n c\u1ea3n DDoS kh\u00f4ng h\u1ec1 l\u00e0 chuy\u1ec7n \u0111\u01a1n gi\u1ea3n.<\/p>\n\n\n\n


\n\n\n\n

C\u00e1ch x\u00e1c \u0111\u1ecbnh m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng DDoS<\/h2>\n\n\n\n

Tri\u1ec7u ch\u1ee9ng bi\u1ec3u hi\u1ec7n r\u00f5 r\u00e0ng nh\u1ea5t c\u1ee7a c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS l\u00e0 trang web ho\u1eb7c d\u1ecbch v\u1ee5 \u0111\u1ed9t nhi\u00ean tr\u1edf n\u00ean ch\u1eadm ch\u1ea1p<\/a> ho\u1eb7c kh\u00f4ng kh\u1ea3 d\u1ee5ng (kh\u00f4ng c\u00f2n kh\u1ea3 n\u0103ng s\u1eed d\u1ee5ng b\u00ecnh th\u01b0\u1eddng \u0111\u01b0\u1ee3c n\u1eefa). <\/p>\n\n\n\n

Tuy nhi\u00ean l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp t\u0103ng \u0111\u1ed9t bi\u1ebfn nh\u01b0 v\u1eady c\u00f3 th\u1ec3 c\u00f3 nhi\u1ec1u nguy\u00ean nh\u00e2n kh\u00e1c nhau. Ngh\u0129a l\u00e0 c\u00e1c nguy\u00ean nh\u00e2n \u0111\u00f3 \u0111\u1ec1u t\u1ea1o ra c\u00e1c v\u1ea5n \u0111\u1ec1 v\u1ec1 hi\u1ec7u su\u1ea5t t\u01b0\u01a1ng t\u1ef1, do v\u1eady th\u01b0\u1eddng ch\u00fang ta c\u1ea7n ph\u1ea3i \u0111i\u1ec1u tra th\u00eam xem \u0111\u00f3 c\u00f3 ph\u1ea3i th\u1ef1c s\u1ef1 l\u00e0 DDoS hay kh\u00f4ng?<\/p>\n\n\n\n

C\u00e1c c\u00f4ng c\u1ee5 ph\u00e2n t\u00edch l\u01b0u l\u01b0\u1ee3ng c\u00f3 th\u1ec3 gi\u00fap b\u1ea1n ph\u00e1t hi\u1ec7n m\u1ed9t s\u1ed1 d\u1ea5u hi\u1ec7u \u0111\u00e1ng ch\u00fa \u00fd c\u1ee7a cu\u1ed9c t\u1ea5n c\u00f4ng DDoS, bao g\u1ed3m:<\/p>\n\n\n\n