拒绝服务攻击拒绝服务(DOS)攻击是一种阻止合法用户访问特定节点,甚至整个矩阵的方法。切断特定节点的通信可能是一个敲诈勒索计划的开始,也可能是在黑客忙于处理某个节点时,试图阻止外部增援进入该节点的努力。更简单的情况,DOS攻击可以阻止某人使用他们的通讯链呼救,或者在他们的载具中时获取导航。合法用户无法访问的设备更容易受到欺骗,因为合法用户无法抵消给它们的指令。
大多数DOS攻击的焦点是节点的活跃帐户列表;通过编辑列表,黑客可以切断连接(参见终止连接,第223页,SR4)。黑客还可以指示节点阻止来自特定节点或访问ID(或一系列节点/访问ID)的未来访问连接请求,将目标锁定在外面。为了做到这一点,黑客必须访问节点,如果他们有安保或管理员权限则并必须进行计算机+编辑(1)检定;或者如果没有,一个骇入+编辑(2)检定。假设你有安保或管理员权限,在软件+编辑(1)检定成功的情况下,也可以删除账户(如果是活跃账户,则必须先终止该用户的连接);或者如果你没有的话,骇入+编辑(2)检定。
有许多其他的方式来完成DOS攻击:干扰无线设备,切断物理网络上的硬线,或改变路由以阻止进入或离开目标节点的流量,都可以完成相同的任务。导致系统崩溃也可以达到同样的效果,尽管只能影响系统重新启动所花费的时间。
劇透 - :
DENIAL OF SERVICE ATTACKS
A denial of service (DOS) attack is a method of keeping legitimate users from accessing a specific node, or even the Matrix at large. Cutting off traffic to a specific node could be the beginning of a plan for extortion, or an effort to prevent outside reinforcements from entering a node while a hacker is busy working with it. More simply, a DOS attack can prevent someone from calling for help using their commlink or from getting directions while in their vehicle. Devices that a legitimate user cannot access are much more susceptible to spoofing because legitimate users cannot counteract the orders given them.
The central focus of most DOS attacks is a node’s active account list; by editing the list a hacker can sever a connection (see Terminate Connection, p. 223, SR4). A hacker can also instruct the node to block future access connection requests from a particular node or access ID (or a range of nodes/access IDs), locking the target out. To accomplish this, the hacker must have access to the node and must make a Computer + Edit (1) Test if they have security or admin privileges; or a Hacking + Edit (2) Test if he does not. Accounts may also be deleted (if active, the user’s connection must be terminated first) with a successful Software + Editing (1) Test, assuming you have security or admin privileges; Hacking + Edit (2) Test if you do not.
There are many other ways to accomplish a DOS attack: jamming a wireless device, cutting the hardlines on a physical network, or changing the routing to prevent traffic in or out of the target node all accomplishes the same task. Causing the system to crash can also achieve the same effect, though only for the amount of time it takes the system to reboot.
分布式拒绝服务攻击(DDOS)黑客也可以使用僵尸网络(第100页)来执行一种拒绝服务攻击,这通常比直接入侵目标节点更容易完成。即使在2070年,节点可以同时处理的数据传输和访问请求的数量依然是有限的,尽管这很少成为问题。执行分布式拒绝服务攻击(DDOS)攻击的黑客试图通过僵尸网络以各种流量淹没节点。
大多数情况下,DDOS攻击需要一个大规模僵尸网络。对于标准节点,每有系统等级x4个试图用流量淹没它的僵尸机,将目标节点的响应能力减少1。例如,一个拥有系统等级5和响应能力5的节点,如果受到来自一个拥有100个僵尸机的僵尸网络的DDOS攻击,它的响应能力将被减少为0,冻结该节点上的所有活动。即使该节点被重新启动,它也会在再次启动后受到流量的猛烈攻击,直到DDOS攻击结束。
受到DDOS攻击的节点有三种选择。首先,它可以欺骗自己的访问ID,这样DDOS攻击就再也找不到目标了。该节点必须处于离线状态(未与其他节点链接),才能切换访问ID。其次,它可以尝试阻止僵尸网络访问ID的访问,或尝试过滤掉所有洪水流量。后面这些选项的成功与否主要取决于GM的判断。
劇透 - :
DISTRIBUTED DENIAL OF SERVICE ATTACKS (DDOS)
Hackers can also use botnets (p. 100) to perform a form of denial of service attack that is generally easier to accomplish than hacking the target node directly. Even in the 2070s, nodes have limits to the number of data transfers and access requests they can handle at once, though this is rarely an issue. A hacker performing a DDOS attempts to overload the node by having a botnet flood it with traffic of all kinds.
In most cases, DDOS attacks require massively large botnets. For standard nodes, reduce the target node’s Response by 1 for every System x 4 bots flooding it with traffic. A node with System 5 and Response 5, for example, hit by a DDOS attack from a botnet with 100 bots, would have its Response reduced to 0, freezing all activity on the node. Even if the node is rebooted, it will be slammed with traffic as soon as it starts again, until the DDOS attack ends.
A node under DDOS attack has three options. First, it can spoof its access ID, so that the DDOS can no longer find its target. The node must be offline (not meshed with other nodes) to switch access ID. Second, it can try to block access from botnet access IDs or attempt to filter out all flooding traffic. The success of these latter options is largely up to the gamemaster’s discretion.