• DDoS Knowledge Center
    • DDoS Chronicles
    • Research
    • DDoSPedia
    • Infographics
  • DDoS Threats & Attacks
    • DDoS Attack Types & Tools
    • Threat Advisories & Attack Reports
  • DDoS Experts' Insider
    • DDoS Best Practices and Guidelines
    • ERT Case Studies
    • Expert Talk
    • Hacker's Corner
    • Losing Sleep in the C-Suite
  • IoT
    • IoT Insights
  • Malware
    • Malware Alerts
  • Contact Us
  • Search

What are you looking for?

  • DDoS Attack Definitions - DDoSPedia

    DDoSPedia is a glossary that focuses on network and application security terms with many distributed denial-of-service (DDoS)-related definitions. It provides a central place for hard to find web-scattered definitions on DDoS attacks.

  • Search

    IP Address

    An IP address is an identifier for a device connected to a network using TCP/IP - a protocol that routes network traffic based on the IP address of its destination. IP addresses can either be 32-bit IPv4 addresses consisting of four base-10 numbers separated by periods representing eight digit binary (base-2) numbers called “octets” (i.e. 0.0.0.0 to 255.255.255.255), or 128-bit IPv6 addresses consisting of eight hexadecimal (base-16) numbers separated by colons representing sixteen digit binary (base-2) numbers (i.e. 0000:0000:0000:0000:0000:0000:0000:0000 to FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF where consecutive groups of four zeroes are replaced by a double colon).

    When the Internet first became popular, IPv4, with its 32-bit addresses, offered 232, or roughly 4.3 x 109 unique addresses. As the number of Internet-connected devices began to grow significantly, people worried that the IPv4 protocol would not contain enough addresses to meet the growing demand for new unique addresses - this is why IPv4 will eventually be replaced by IPv6 on a large scale (IPv6 already officially launched in June 2012), which contains 2128 or roughly 3.4 x 1038 unique addresses.

    The Dynamic Host Configuration Protocol (DHCP), which runs on special devices (usually routers) allows for the assigning of IP addresses within a local area network (LAN). DHCP assigns IP addresses on a temporary “lease” basis; once a device’s IP address lease expires, a DHCP server will assign it a new (potentially different) one. IP addresses automatically assigned by a DHCP server are therefore referred to as “dynamic IP addresses”, as a device with a DHCP-assigned IP address may eventually receive an IP different from its original one.

    DHCP servers will not assign devices just any IP address in the maximum range of IPv4 addresses (0.0.0.0 to 255.255.255.255), as certain IP addresses are reserved for special purposes. Such addresses include:

    • 0.0.0.0 – Represents the “default” network, i.e. any connection
    • 255.255.255.255 – Represents the broadcast address, or place to route messages to be sent to every device within a network
    • 127.0.0.1 – Represents “localhost” or the “loopback address”, allowing a device to refer to itself, regardless of what network it is connected to
    • 169.254.X.X – Represents a “self-assigned IP address”, which a device will assign itself if it is unable to receive an IP address from a DHCP server

    Users’ DHCP-assigned IP addresses on a LAN are not the same as their “external” or Internet IP address. This address will be the same for all users connected to a DHCP server, which itself receives an IP address from the Internet Service Provider (ISP) it is connected to.

    As IP addresses can be used as unique identifiers for users’ machines (and subsequently the users themselves), knowledge of a malicious user’s external Internet IP address can allow law enforcement officials to block, locate, and eventually arrest him or her. As a result, the more advanced attack tools and hackers will employ anonymization techniques - such as the use of proxy servers, VPNs, or a routing network like Tor or I2P - that can make it seem like they are using a different IP address other than their own, located somewhere else in the world. An attack tool called Low Orbit Ion Cannon (LOIC) became infamous for not hiding its users’ IP addresses; this resulted in the arrest of various LOIC users around the world for their participation in distributed denial-of-service (DDoS) attacks.

  • DDoSPedia Index

    #

    • #OpIsrael
    • #RefRef

    A

    • ADB Miner
    • Admin.HLP
    • Advanced Persistent Attack
    • Amplification Attack
    • Anonymous
    • Apache Killer
    • Application Misuse Attack
    • ARP Poisoning
    • Asymmetric Attack

    B

    • Backdoor
    • Booster Script
    • Border Gateway Protocol (BGP) Attack
    • Botmaster
    • Botnet
    • Boy-in-the-Browser Attack
    • BrickerBot
    • Buffer Overflow Attack
    • ByteDoS

    C

    • CERT
    • Clean Pipe
    • Clearnet
    • Click Fraud
    • Clickjacking
    • CoAP
    • Command and Control Server
    • Conflicker
    • Cookie
    • Cookie Poisoning
    • Counter-attack
    • Cryptovirus
    • CutWail Botnet
    • CVE
    • Cyber Ransom

    D

    • Darknet
    • Darkness (Optima)
    • DarkSky
    • Dark Web
    • Deep Web
    • Digital Fraud
    • Distributed Denial-of-Service (DDoS) Attack
    • DNS Amplification Attack
    • DNS Flood
    • DoS (Denial-of-Service) Attack
    • DrDos Attack
    • Duqu
    • Dynamic Web Injection

    E

    • Exploit

    F

    • Flame
    • Flood
    • Forged Cookie
    • Fraggle Attack
    • Fragmented ACK Attack

    G

    • Guy Fawkes Mask

    H

    • Hacker
    • Hacktivist
    • Hijackware
    • High-rate Attack
    • HOIC (High Orbit Ion Cannon)
    • Honeypot
    • Hping
    • HTTP Challenge
    • HTTP Cookie
    • HTTP Flood
    • HTTP Fragmentation Attack

    I

    • I2P (Invisible Internet Project)
    • ICMP Flood
    • Impression Fraud
    • Ingress Filtering (InFilter)
    • Internet Pipe Saturation
    • IP Address
    • IP Spoofing
    • IRC (Internet Relay Chat)
    • ISP (Internet Service Provider)
    • itsoknoproblembro
    • Izz ad-Din al-Qassam Cyber Fighters

    J

    • JenX
    • JS Cookie Challenges

    K

    • Keylogging

    L

    • LAND Attack
    • LOIC (Low Orbit Ion Cannon)
    • Low-rate Attack
    • LulzSec

    M

    • MalSpam
    • Malware
    • Man-in-the-Browser Attack
    • Man-in-the-Middle Attack
    • Memcached
    • Mirai
    • Mitigating Controls
    • Mobile LOIC
    • Morris Worm
    • MSSP
    • Multi-Factor Authentication
    • Mydoom

    N

    • Naptha Attacks
    • Necurs
    • Network Scan
    • Nuke

    O

    • Open DNS Resolver
    • Operation Ababil
    • Operation AntiSec
    • Operation Blackout
    • Operation Defense
    • Operation Killing Bay
    • Operation Payback
    • OpIcarus
    • OpIsrael
    • OpKillingBay
    • OpSingleGateway

    P

    • Packet
    • Pandex Botnet
    • Parasiteware
    • Peer to Peer Attack
    • Ping of Death
    • PitbullBot
    • Port Scan
    • Pushdo Botnet
    • Putinstresser
    • Pyloris

    Q

    No terms currently listed.

    R

    • Ransomware
    • Ransom DDoS
    • Rate Limit
    • RFI/LFI
    • Reflector/Reflective DoS attacks
    • Reflector server
    • Resident Virus
    • R.U.D.Y. (R-U-Dead-Yet?)

    S

    • Scareware
    • Scrubbing Center
    • Session Hijacking
    • SIP Register flood
    • SIP Malformed Attack
    • SIP Server Flood
    • SIP brute force
    • SIP Client Call Flood
    • Slow-Rate Attack
    • Slowloris
    • Smurf Attack
    • Social Engineering
    • Sockstress
    • SQL Injection
    • SSL Garbage Flood
    • Stabuniq
    • Static Web Injection
    • Stuxnet
    • Supply Chain Attack
    • SYN-ACK Flood
    • SYN cookies
    • SYN Flood

    T

    • Topera
    • Tor's Hammer
    • TOR
    • TCP Flood
    • Trin00
    • TheWikiBoat
    • THC-SSL DoS
    • Traffic
    • Trickbot
    • Trojan Horse
    • TDL-4 (Alureon)
    • TCP Window Scaling
    • Teardrop Attack

    U

    • UDP Flood

    V

    • Vulnerability
    • Vulnerability Scanner

    W

    • WannaCry
    • Wireshark
    • Web Scraping
    • Worm

    X

    • XerXeS

    Y

    No terms currently listed.

    Z

    • Zeus
    • Zero-Day/Zero-Minute Attack
    • Zombie
Top
DDoS Knowledge Center
  • DDoS Chronicles
  • Research
  • DDoS Definitions - DDoSPedia
  • Infographics
radware.com
  • Security
  • SSL Attack Protection
  • Application & Network Security
DDoS Threats and Attacks
  • DDoS Attack Types
  • DDoS Ring of Fire
  • Threat Advisories and Attack Reports
Community
  • Radware Blog
  • Radware Connect
DDoS Experts' Insider
  • Losing Sleep in the C-Suite
  • Expert Talk
  • ERT Case Studies

Under Attack and Need Emergency Assistance?

Radware Can Help. Click Here.

© Radware Ltd. 2018 All Rights Reserved | Privacy Policy | Feedback |

  • Twitter
  • LinkedIn
  • Google+
  • YouTube
  • facebook
  • slideshare