DDoS attacks are launched online with “toolkits” specifically designed to cause such episodes. Probably the most well-known toolkits, an early version, was known as after the Ion canon, a fictional weapon in a video game business known as Command & conquer, the Low Orbit Ion Cannon (LOIC) is an open source network stress testing and DDOS attack application that is employed by client machines to voluntarily join botnets. booter
A distributed denial of service attack refers to a flood of data traffic that the server receives when multiple systems send in data with an goal of flooding its band width or resources. Generally, this data flood is meant at disrupting the obtaining of legitimate traffic by the server, ‘denying service’ to clients sending demands to the server. For an end user, when a DDOS attack seems like a service request delay, where new connections shall no longer be accepted.
LOIC has been in charge of several DDOS attacks on major websites such as PayPal, MasterCard and Visa, usually carried out by cracking groups such as Private. The LOIC application can be found in two versions: the first being the binary version or the original LOIC tool that was primarily developed to stress test networks and the web based LOIC or JS LOIC.
The LOIC app, first developed by Praetox Technologies, sends a sizable collection of HTTP, UDP or TCP requests to the point server. LOIC is user friendly even by users who lack basic hacking skills. All that is required is the URL of the target. To control the LOIC remotely, some hackers hook up the consumer launching the attack to an Internet Relay Data using the IRC process.
Using this protocol, the consumer machine becomes part of the botnet. Botnets are sites of compromised computer systems that are handled by a virus or adware and spyware and that send a flood of traffic to a target system when prompted.
The LOIC DDOS uses three types of attacks resistant to the target machine. These include HTTP, UDP and TCP. These put into action the same mechanism of attack which is to open multiple connections to the prospective machine and send a consistent sequence of messages to the concentrate on machine. The LOIC tool continues sending visitors the targeted server, before the server is overloaded. When ever the server cannot reply to the requests of legitimate users, it effectively shuts down.
The LOIC DDOS attack tool has been downloaded a lot of times because it is simple to use and simple to identify. Network administrators may use a robust firewall to prevent or minimize the attack. Server administrators can then look at the logs to identify the IP sending the traffic and block the IP from the server. Very well written firewall rules can form a great filtration system from LOIC DDOS stopping the attacks from being fully effective.
Some experts claim that filtering UDP and ICMP traffic can also effectively address LOIC attacks. To be effective at the firewall level, rules must be integrated earlier in the network link for instance at the ISP site agent, where the server hooks up to the backbone with a broadband line.
It is also important to check the broadband line to ensure it does not have limitations. If the packets are delivered through a narrow bandwidth then clogging on this collection will still occur before any traffic can arrive at the firewall and get filtered.