{"id":6465,"date":"2026-01-22T16:45:15","date_gmt":"2026-01-22T15:45:15","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6465"},"modified":"2026-01-22T16:47:53","modified_gmt":"2026-01-22T15:47:53","slug":"podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/","title":{"rendered":"Podrobne o DDoS \u00fatokoch: ako funguj\u00fa a ako sa pred nimi chr\u00e1ni\u0165?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1024x576.jpg\" alt=\"BVF DDOS utoky nahladovy obrazok\" class=\"wp-image-6466\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1024x576.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-300x169.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-768x432.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-370x208.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1170x658.jpg 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-972x546.jpg 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-760x428.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-270x152.jpg 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks.jpg 1244w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>\u00datoky DDoS s\u00fa mimoriadne hlu\u010dnou s\u00fa\u010das\u0165ou kyberkriminality \u2013 ich cie\u013eom je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. V tomto \u010dl\u00e1nku podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165.<\/em><\/p>\n\n\n\n<p>V\u00e4\u010d\u0161ina kybernetick\u00fdch \u00fatokov je z\u00e1kern\u00e1. Je \u0165a\u017ek\u00e9 ich odhali\u0165, k\u00fdm nie je neskoro, preto\u017ee \u00fato\u010dn\u00edci nechc\u00fa, aby ich obete vedeli, \u017ee s\u00fa nap\u00e1dan\u00e9. Existuje na to nieko\u013eko d\u00f4vodov. \u00dato\u010dn\u00edci chc\u00fa zosta\u0165 neodhalen\u00ed, k\u00fdm nedosiahnu svoj cie\u013e, napr\u00edklad dostato\u010dn\u00fa \u00farove\u0148 pr\u00edstupu na spustenie ransomv\u00e9rov\u00e9ho \u00fatoku. V in\u00fdch pr\u00edpadoch je pre \u00fato\u010dn\u00edka lep\u0161ie, ak obe\u0165 v\u00f4bec netu\u0161\u00ed, \u017ee bola napadnut\u00e1.<\/p>\n\n\n\n<p>\u00datoky typu Distributed Denial of Service (DDoS) s\u00fa opakom tohto: s\u00fa hlu\u010dn\u00e9, zrejm\u00e9 a neuverite\u013ene de\u0161trukt\u00edvne. \u010co presne je DDoS?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Defin\u00edcia \u00fatokov DoS a DDoS<\/h2>\n\n\n\n<p>Za\u010dnime vysvetlen\u00edm star\u00e9ho dobr\u00e9ho \u00fatoku typu Denial of Service (DoS), ktor\u00fd spo\u010d\u00edva v tom, \u017ee slu\u017eba poskytovan\u00e1 po\u010d\u00edta\u010dom alebo in\u00fdm sie\u0165ov\u00fdm zdrojom (napr\u00edklad \u00falo\u017en\u00fdm po\u013eom, smerova\u010dom, serverom alebo celou sie\u0165ou) sa stane pre pou\u017e\u00edvate\u013eov nedostupnou t\u00fdm, \u017ee sa na \u0148u opakovane smeruje ve\u013ek\u00e9 mno\u017estvo prev\u00e1dzky a slu\u017eba je efekt\u00edvne zahlten\u00e1 neplatn\u00fdmi po\u017eiadavkami. Najpopul\u00e1rnej\u0161\u00edm cie\u013eom \u00fatokov DoS s\u00fa webov\u00e9 servery.<\/p>\n\n\n\n<p>\u00datoky DoS m\u00f4\u017eu ma\u0165 formu obrovsk\u00e9ho objemu, mno\u017estva dotazov obsahuj\u00facich neplatn\u00e9 \u00fadaje alebo po\u017eiadaviek, ktor\u00e9 prich\u00e1dzaj\u00fa z nelegit\u00edmnych IP adries. Jedn\u00fdm zo sp\u00f4sobov, ako si to predstavi\u0165, je call centrum: ak je k dispoz\u00edcii 20 liniek a 20 \u013eud\u00ed, ktor\u00ed na ne odpovedaj\u00fa, po prv\u00fdch 20 hovoroch ostatn\u00ed volaj\u00faci po\u010duj\u00fa obsaden\u00fd t\u00f3n a automatick\u00fa spr\u00e1vu. \u010eal\u0161\u00edm sp\u00f4sobom je predstavi\u0165 si sie\u0165 ako cestn\u00fa sie\u0165: po\u0161lite pr\u00edli\u0161 ve\u013ea vozidiel, zapl\u0148te v\u0161etky pruhy, dokonca nechajte niektor\u00e9 z nich pokazen\u00e9, a doprava sa zastav\u00ed. DoS \u00fatok bude pre pou\u017e\u00edvate\u013eov vyzera\u0165 inak, ale kone\u010dn\u00fd v\u00fdsledok je rovnak\u00fd: chyby, oneskorenia a zlyhania.<\/p>\n\n\n\n<p>V porovnan\u00ed s t\u00fdm \u00fatoky typu Distributed Denial of Service (DDoS), ako nazna\u010duje n\u00e1zov, robia to ist\u00e9, ale pou\u017e\u00edvaj\u00fa ve\u013ek\u00e9 mno\u017estvo r\u00f4znych zariaden\u00ed na odosielanie prev\u00e1dzky do cie\u013eovej siete alebo zariadenia. \u010casto s\u00fa \u201e\u00fato\u010diace\u201c zariadenia kompromitovan\u00e9 pomocou malv\u00e9ru a premenen\u00e9 na sie\u0165 zariaden\u00ed, ktor\u00e9 m\u00f4\u017eu by\u0165 nasmerovan\u00e9 na odosielanie prev\u00e1dzky obetiam ako jednotn\u00e1 masa.<\/p>\n\n\n\n<p>\u00datoky DDoS a DoS nemusia by\u0165 nutne zameran\u00e9 na konkr\u00e9tne slab\u00e9 miesto. Namiesto toho sa sna\u017eia dosiahnu\u0165 maxim\u00e1lnu kapacitu ak\u00e9hoko\u013evek \u010dl\u00e1nku v re\u0165azci. M\u00f4\u017ee to by\u0165 samotn\u00e1 sie\u0165, ktor\u00e1 zlyh\u00e1, \u00falo\u017eisko na disku \u010di pam\u00e4\u0165 ktor\u00e9hoko\u013evek z viacer\u00fdch zariaden\u00ed alebo slu\u017eieb v cieli. V niektor\u00fdch pr\u00edpadoch to m\u00f4\u017ee by\u0165 samotn\u00e1 \u0161\u00edrka p\u00e1sma \u2013 poskytovatelia internetov\u00fdch slu\u017eieb maj\u00fa tendenciu stanovova\u0165 kv\u00f3ty pre objem webovej alebo internetovej prev\u00e1dzky, ktor\u00fa ich z\u00e1kazn\u00edci vyu\u017e\u00edvaj\u00fa.<\/p>\n\n\n\n<p>Bez oh\u013eadu na to je samozrejme \u00fa\u010delom t\u00fdchto \u00fatokov odmietnu\u0165 slu\u017eby pou\u017e\u00edvate\u013eom, \u010di u\u017e s\u00fa to zamestnanci, z\u00e1kazn\u00edci alebo in\u00ed pou\u017e\u00edvatelia. V\u00fdsledkom je naru\u0161enie podnikania a strata dostupnosti.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-3316b61d4da45d86e6d8d8cb0eab908f is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading has-text-align-center\">DoS <br>(Odmietnutie slu\u017eby)<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Jeden zdroj<\/strong><br>Jedno zariadenie alebo IP rozsah zaplav\u00ed cie\u013e<\/li>\n\n\n\n<li><strong>Vysok\u00e1 z\u00e1\u0165a\u017e<\/strong><br>Pre\u0165a\u017eenie syst\u00e9mu<\/li>\n\n\n\n<li><strong>Obmedzen\u00fd dopad<\/strong><br>Ovplyvn\u00ed jeden server alebo slu\u017ebu<\/li>\n\n\n\n<li><strong>Jednoduch\u00e9 blokovanie<\/strong><br>Zdroj je \u013eahko vysledovate\u013en\u00fd a blokovate\u013en\u00fd<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-bg-color-color has-text-link-background-color has-text-color has-background has-link-color wp-elements-fa1f8ea6648f03ad95e392ec6269613a is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading has-text-align-center\">DDoS <br>(Distribuovan\u00e9 odmietnutie slu\u017eby)<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Viacer\u00ed \u00fato\u010dn\u00edci<\/strong><br>Mnoho infikovan\u00fdch zariaden\u00ed (botnet) kon\u00e1 spolu<\/li>\n\n\n\n<li><strong>Mas\u00edvna z\u00e1\u0165a\u017e<\/strong><br>Zaplav\u00ed a zr\u00fati cie\u013eov\u00fd syst\u00e9m<\/li>\n\n\n\n<li><strong>\u0160ir\u0161\u00ed dopad<\/strong><br>M\u00f4\u017ee zni\u010di\u0165 cel\u00e9 siete alebo \u010dasti internetu<\/li>\n\n\n\n<li><strong>\u0164a\u017e\u0161ie blokovanie<\/strong><br>Vy\u017eaduje komplexnej\u0161iu obranu a siln\u00fa infra\u0161trukt\u00faru<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Pre\u010do DDoS zmenil pravidl\u00e1 hry<\/h2>\n\n\n\n<p>\u00datoky typu Distributed Denial of Service (distribuovan\u00e9 odmietnutie slu\u017eby) vych\u00e1dzaj\u00fa z my\u0161lienky vyu\u017eitia rozpt\u00fdlenej sily \u2013 botnetu \u2013 hlavne preto, \u017ee bolo pomerne jednoduch\u00e9 blokova\u0165 po\u017eiadavky na pripojenie z jednej siete alebo zariadenia a relat\u00edvne \u013eahk\u00e9 vystopova\u0165 ich zdroj. Ke\u010f\u017ee prev\u00e1dzka poch\u00e1dza zo stoviek, ak nie tis\u00edcov legit\u00edmnych zariaden\u00ed pripojen\u00fdch k internetu, presmerovanie alebo sink-holing \u0161kodlivej prev\u00e1dzky nefunguje.<\/p>\n\n\n\n<p>Botnety boli p\u00f4vodne koncipovan\u00e9 ako ne\u0161kodn\u00e9 n\u00e1stroje: sp\u00f4sob budovania distribuovanej v\u00fdpo\u010dtovej kapacity alebo sp\u00f4sob preh\u013ead\u00e1vania webov\u00fdch str\u00e1nok bez spotrebovania obrovsk\u00e9ho mno\u017estva \u0161\u00edrky p\u00e1sma. Napr\u00edklad botnet Carna bol (aspo\u0148 pod\u013ea jeho anonymn\u00e9ho tvorcu) ur\u010den\u00fd na mapovanie pou\u017e\u00edvania adries IPV4 po celom svete. Bohu\u017eia\u013e, Carna dosiahol tento \u00faspech s pomocou ak\u00fdchko\u013evek zariaden\u00ed pripojen\u00fdch k internetu, ku ktor\u00fdm mal pr\u00edstup a ktor\u00e9 bu\u010f nemali administr\u00e1torsk\u00e9 heslo, alebo mali predvolen\u00e9 pou\u017e\u00edvate\u013esk\u00e9 meno a heslo.<\/p>\n\n\n\n<p>T\u00e1to inov\u00e1cia nezostala bez pov\u0161imnutia \u00fato\u010dn\u00edkov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Nejde len o po\u010d\u00edta\u010de napadnut\u00e9 \u0161kodliv\u00fdm softv\u00e9rom<\/h2>\n\n\n\n<p>Ako prostriedok na vykon\u00e1vanie DDoS \u00fatokov sa \u010dasto vyu\u017e\u00edvaj\u00fa botnety pozost\u00e1vaj\u00face z napadnut\u00fdch po\u010d\u00edta\u010dov, ale \u010doraz viac aj <strong><a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/6-iot-hrozby-smart-zariadenia-utociace-bez-vasho-vedomia\/\">zo zariaden\u00ed internetu vec\u00ed (IoT)<\/a><\/strong>. Internet vec\u00ed obsahuje mili\u00f3ny men\u0161\u00edch zariaden\u00ed, ktor\u00e9 zvy\u010dajne nie s\u00fa kon\u0161truk\u010dne zabezpe\u010den\u00e9 a na rozdiel od po\u010d\u00edta\u010dov alebo smartf\u00f3nov nemaj\u00fa zdroje na sp\u00fa\u0161\u0165anie bezpe\u010dnostn\u00fdch programov na svoju ochranu. Preto s\u00fa skvel\u00fdm cie\u013eom pre kyberzlo\u010dincov a \u010dasto m\u00f4\u017eu by\u0165 kompromitovan\u00e9 vo ve\u013ekom meradle.<\/p>\n\n\n\n<p>In\u00fdmi slovami, DDoS \u00fatok bude ve\u013emi \u010dasto vyu\u017e\u00edva\u0165 na hromadn\u00e9 zasielanie po\u017eiadaviek st\u00e1do kompromitovan\u00fdch routerov, IP kamier, ale aj \u017eiaroviek, chladni\u010diek a pr\u00e1\u010dok pripojen\u00fdch k internetu.<\/p>\n\n\n\n<p>Jedn\u00fdm z najzn\u00e1mej\u0161\u00ed\u010dh IoT botnetov vyu\u017e\u00edvan\u00fdch na DDoS \u00fatoky je Mirai. Bol prv\u00fdkr\u00e1t zaznamenan\u00fd v roku 2016 a jeho napodobitelia na\u010falej vyu\u017e\u00edvaj\u00fa zle zabezpe\u010den\u00e9 zariadenia IoT pripojen\u00e9 k internetu, ako s\u00fa bezpe\u010dnostn\u00e9 kamery a dom\u00e1ce \u0161irokop\u00e1smov\u00e9 routery. Zdrojov\u00fd k\u00f3d Mirai bol v roku 2016 verejne spr\u00edstupnen\u00fd, \u010do viedlo k \u010fal\u0161iemu v\u00fdvoju zo strany \u00fato\u010dn\u00edkov a za\u010dleneniu do viacer\u00fdch hackersk\u00fdch n\u00e1strojov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vzostup botnetov a DDoS ako slu\u017eba<\/h2>\n\n\n\n<p>Kyberzlo\u010dinci tie\u017e premenili DDoS na slu\u017eby dostupn\u00e9 na darkwebe a spr\u00edstupnili ich na pren\u00e1jom, alebo v pr\u00edpade Booters spr\u00edstupnili botnety komuko\u013evek bez oh\u013eadu na jeho motiv\u00e1ciu. Rozdiel medzi Booterom a Stresserom, (zvy\u010dajne) legit\u00edmnou komer\u010dnou slu\u017ebou, ktor\u00fa spolo\u010dnosti pou\u017e\u00edvaj\u00fa na stresov\u00e9 testovanie svojich vlastn\u00fdch siet\u00ed, je ve\u013emi tenk\u00fd a hranica je \u010dasto z\u00e1merne rozmazan\u00e1 neetick\u00fdmi alebo krimin\u00e1lnymi skupinami.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Kr\u00e1tka hist\u00f3ria DDoS \u00fatokov<\/h2>\n\n\n\n<p>Pravdepodobne najskor\u0161\u00edm DDoS \u00fatokom bol Panix Attack v roku 1996, ktor\u00fd bol zameran\u00fd na ran\u00e9ho poskytovate\u013ea internetov\u00fdch slu\u017eieb (ISP) Panix a mal za n\u00e1sledok dvojd\u0148ov\u00fd v\u00fdpadok newyorsk\u00e9ho ISP a n\u00e1sledn\u00fa stratu slu\u017eieb pre jeho z\u00e1kazn\u00edkov. V nasleduj\u00facom roku to viedlo k s\u00e9rii podobn\u00fdch \u00fatokov na in\u00fdch ISP. Zlo\u017eitos\u0165 a objem \u00fatokov sa v nasleduj\u00facich rokoch len zv\u00fd\u0161ili a spotrebovali \u010doraz viac \u0161\u00edrky p\u00e1sma. <\/p>\n\n\n\n<p>Za pozoruhodn\u00fd bol pova\u017eovan\u00fd \u00fatok na Amazon Web Services v roku 2020, preto\u017ee dosiahol vrcholn\u00fd objem prev\u00e1dzky 2,3 terabitu za sekundu, \u010do je ekvivalent polovice dennej prev\u00e1dzky siete British Telecom v tom \u010dase. O p\u00e4\u0165 rokov nesk\u00f4r, v m\u00e1ji 2025, syst\u00e9my Cloudflare auton\u00f3mne zablokovali \u00fatok, ktor\u00fd dosiahol vrcholov\u00fd objem 7,3 terabitov za sekundu. Kr\u00e1tko na to, v polovici novembra 2025, bol <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/azureinfrastructureblog\/defending-the-cloud-azure-neutralized-a-record-breaking-15-tbps-ddos-attack\/4470422\">slu\u017ebou Microsoft DDOS Protection<\/a> zaznamenan\u00fd \u00fatok s objemom 15,72 Tbps. Blog spolo\u010dnosti Microsoft, ktor\u00fd sa touto t\u00e9mou zaober\u00e1, v\u00fdslovne sp\u00e1ja n\u00e1rast \u0161\u00edrky p\u00e1sma s n\u00e1rastom \u0161\u00edrky p\u00e1sma spotrebite\u013eov v\u010faka technol\u00f3gii Fiber-to-the-Home a \u010doraz po\u010detnej\u0161\u00edm a v\u00fdkonnej\u0161\u00edm zariadeniam IoT.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pre\u010do doch\u00e1dza k DDoS \u00fatokom?<\/h2>\n\n\n\n<p>\u00dato\u010dn\u00edci chc\u00fa pr\u00edstup k slu\u017eb\u00e1m znemo\u017eni\u0165 z r\u00f4znych d\u00f4vodov. V minulosti vyu\u017e\u00edvali \u00fatoky DoS a DDoS na naru\u0161enie slu\u017eieb a zabr\u00e1nenie ostatn\u00fdm v ich pou\u017e\u00edvan\u00ed nespokojn\u00ed b\u00fdval\u00ed zamestnanci, hacktivisti a trollovia. Hackeri v\u0161ak dnes pou\u017e\u00edvaj\u00fa DDoS aj na odl\u00e1kanie pozornosti obrancov, vniknutie do slu\u017eieb a vydieranie organiz\u00e1ci\u00ed. N\u00e1rodn\u00e9 \u0161t\u00e1ty tie\u017e pou\u017e\u00edvaj\u00fa DDoS na naru\u0161enie syst\u00e9mov, soci\u00e1lnych slu\u017eieb a obrann\u00fdch schopnost\u00ed nepriate\u013eov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ktor\u00e9 organiz\u00e1cie s\u00fa n\u00e1chylnej\u0161ie na \u00fatoky DDoS?<\/h2>\n\n\n\n<p>Existuje vo\u013ene dostupn\u00fd open-source merac\u00ed n\u00e1stroj, ktor\u00fd je navrhnut\u00fd na ochranu organiz\u00e1ci\u00ed pred \u00fatokmi a vedie o nich z\u00e1znamy. <a href=\"https:\/\/securityboulevard.com\/2025\/10\/which-industries-are-most-at-risk-for-ddos-attacks\/\">DDoS Resiliency Score<\/a> v s\u00fa\u010dasnosti ukazuje, \u017ee finan\u010dn\u00e9 slu\u017eby, dod\u00e1vatelia energie, vl\u00e1dne a verejn\u00e9 organiz\u00e1cie, telekomunika\u010dn\u00e9 a internetov\u00e9 spolo\u010dnosti, hern\u00e9 a hazardn\u00e9 spolo\u010dnosti a dod\u00e1vatelia softv\u00e9ru a SaaS s\u00fa vystaven\u00ed vy\u0161\u0161iemu riziku naru\u0161enia DDoS \u00fatokmi. V\u0161etky tieto organiz\u00e1cie bud\u00fa trpie\u0165 v pr\u00edpade v\u00fdpadku siete z r\u00f4znych d\u00f4vodov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Typy \u00fatokov DDoS<\/h2>\n\n\n\n<p>R\u00f4zne \u00fatoky funguj\u00fa na r\u00f4znych vrstv\u00e1ch sie\u0165ov\u00e9ho modelu OSI, ktor\u00fd poskytuje r\u00e1mec pre r\u00f4zne \u00farovne \u2013 alebo vrstvy \u2013 ktor\u00e9 tvoria sie\u0165. Ni\u017e\u0161ie pochop\u00edte, ako sa r\u00f4zne typy \u00fatokov zameriavaj\u00fa na r\u00f4zne aspekty sie\u0165ovej \u00farovne, na ktor\u00fa \u00fato\u010dia.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. \u00datoky DDoS na vrstve 7<\/h3>\n\n\n\n<p>Najbe\u017enej\u0161\u00edm \u00fatokom, ktor\u00fd je pre pou\u017e\u00edvate\u013eov najviac vidite\u013en\u00fd, je \u00fatok DDoS na vrstve 7. Vrstva 7 modelu OSI, \u010dasto ozna\u010dovan\u00e1 ako aplika\u010dn\u00e1 vrstva, je miestom, kde aplik\u00e1cie m\u00f4\u017eu pristupova\u0165 k sie\u0165ov\u00fdm slu\u017eb\u00e1m \u2013 napr\u00edklad k webov\u00fdm serverom a in\u00fdm aplik\u00e1ci\u00e1m, s ktor\u00fdmi skuto\u010dn\u00ed pou\u017e\u00edvatelia interaguj\u00fa. Pri mnoh\u00fdch \u00fatokoch L7 sa \u00fato\u010dn\u00edk pok\u00fasi zahlti\u0165 webov\u00fd server cie\u013ea \u010do najv\u00e4\u010d\u0161\u00edm po\u010dtom HTTP po\u017eiadaviek \u2013 \u010do sa ozna\u010duje ako HTTP Flood. Jednoducho povedan\u00e9, \u00fato\u010dn\u00edk efekt\u00edvne \u017eiada o zobrazenie obrovsk\u00e9ho po\u010dtu webov\u00fdch str\u00e1nok, podobne ako mili\u00f3ny pou\u017e\u00edvate\u013eov, ktor\u00ed sa sna\u017eia prehliada\u0165 t\u00fa ist\u00fa webov\u00fa str\u00e1nku naraz a neust\u00e1le obnovuj\u00fa svoj prehliada\u010d. Ako uvid\u00edme nesk\u00f4r, toto sa m\u00f4\u017ee sta\u0165 aj z legit\u00edmnych d\u00f4vodov a je to zdokumentovan\u00fd internetov\u00fd fenom\u00e9n.<\/p>\n\n\n\n<p>\u010eal\u0161\u00ed pr\u00edklad, ktor\u00fd sa st\u00e1va \u010doraz be\u017enej\u0161\u00edm, sa t\u00fdka e-mailov\u00fdch slu\u017eieb, bu\u010f pre jednotlivcov, alebo pre organiz\u00e1cie. Na vlastnej sk\u00fasenosti m\u00f4\u017eu pou\u017e\u00edvatelia zisti\u0165, \u017ee ich doru\u010den\u00e1 po\u0161ta je zaplaven\u00e1 tis\u00edckami e-mailov, \u010do \u010dasto sl\u00fa\u017ei ako z\u00e1sterka na skrytie upozornen\u00ed na resetovanie hesla a podozriv\u00e9 prihl\u00e1senia, ktor\u00e9 by odhalili \u00fato\u010dn\u00edkov sna\u017eiacich sa vnikn\u00fa\u0165 do \u00fa\u010dtu obete.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. \u00datoky na protokol<\/h3>\n\n\n\n<p>\u00datoky na protokol s\u00fa zameran\u00e9 sk\u00f4r na sie\u0165ov\u00e9 zariadenia ako na aplik\u00e1cie a zameriavaj\u00fa sa na slab\u00e9 miesta na vrstve 3 (sie\u0165ov\u00e1 vrstva) a vrstve 4 (transportn\u00e1 vrstva) modelu OSI. Ak ste obozn\u00e1men\u00ed s modelom OSI, viete, \u017ee tento pr\u00edstup je zameran\u00fd na protokoly L3 a L4, ako je TCP\/IP. Napr\u00edklad \u00fato\u010dn\u00edk m\u00f4\u017ee iniciova\u0165 \u00fatok SYN Flood, ktor\u00fd vyu\u017e\u00edva trojcestn\u00e9 potvrdenie pri TCP pripojen\u00ed. To prebieha tak, \u017ee po\u010d\u00edta\u010d po\u0161le serveru paket SYN, aby otvoril \u017eiados\u0165. Server odpovie paketom SYN\/ACK, \u010d\u00edm s\u00fahlas\u00ed s pripojen\u00edm, otvor\u00ed port a po\u010d\u00edta\u010d na druhom konci odpovie paketom ACK, \u010d\u00edm potvrd\u00ed a nadvia\u017ee pripojenie. Pri \u00fatoku SYN Flood \u00fato\u010dn\u00edk odosiela opakovan\u00e9 po\u017eiadavky na pripojenie vo forme paketu SYN. Cie\u013eov\u00fd server potom odpovie paketom SYN\/ACK a otvor\u00ed port pre pripojenie, akon\u00e1hle prijme paket ACK \u2013 ktor\u00fd v\u0161ak nikdy nedoraz\u00ed. Norm\u00e1lne servery po ur\u010ditej dobe port uzavr\u00fa, ale ak \u00fato\u010dn\u00edk odo\u0161le dostato\u010dn\u00e9 mno\u017estvo paketov SYN, server je pre\u0165a\u017een\u00fd a prestane odpoveda\u0165 na po\u017eiadavky.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Objemov\u00e9 \u00fatoky<\/h3>\n\n\n\n<p>Tret\u00edm typom DDoS \u00fatoku je objemov\u00fd \u00fatok. Jeho cie\u013eom je zaplavi\u0165 sie\u0165 cie\u013ea prev\u00e1dzkou a po\u017eiadavkami na d\u00e1ta, aby sa pre\u0165a\u017eila \u0161\u00edrka p\u00e1sma siete a jej schopnos\u0165 spracov\u00e1va\u0165 po\u017eiadavky. Podobne ako v pr\u00edpade \u00fatokov na aplika\u010dnej vrstve, ur\u010dit\u00e9 typy po\u017eiadaviek od \u00fato\u010dn\u00edkov vyu\u017e\u00edvaj\u00fa len ve\u013emi m\u00e1lo zdrojov \u00fato\u010dn\u00edkov, ale ich odpove\u010f je pre cie\u013e n\u00e1kladn\u00e1; jedn\u00fdm z pr\u00edkladov s\u00fa po\u017eiadavky na DNS dotazy. \u010eal\u0161\u00edm pr\u00edkladom je pou\u017eitie protokolu UDP (User Datagram Protocol) na zaplavenie serverov cie\u013ea po\u017eiadavkami IP, ktor\u00e9 ne\u0161pecifikuj\u00fa cie\u013eov\u00fa destin\u00e1ciu ani zam\u00fd\u0161\u013ean\u00fa aplik\u00e1ciu. Vo v\u0161etk\u00fdch pr\u00edpadoch to vedie k tomu, \u017ee server nedok\u00e1\u017ee spracova\u0165 po\u010det po\u017eiadaviek, ktor\u00e9 s\u00fa mu zasielan\u00e9, aj keby boli p\u00f4vodne legit\u00edmne.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DDoS alebo pre\u0165a\u017eenie legit\u00edmnou prev\u00e1dzkou?<\/h2>\n\n\n\n<p>Stoj\u00ed za zmienku, \u017ee jeden z najvidite\u013enej\u0161\u00edch incidentov podobn\u00fdch DDoS pre be\u017en\u00e9ho pou\u017e\u00edvate\u013ea internetu je v skuto\u010dnosti ne\u0161kodn\u00fd a naz\u00fdva sa Reddit Hug of Death alebo (ak m\u00e1te p\u00e1r \u0161ediv\u00fdch vlasov) Slashdot efekt. Ide o situ\u00e1ciu, ke\u010f webov\u00e1 str\u00e1nka s ve\u013ek\u00fdm po\u010dtom pou\u017e\u00edvate\u013eov odkazuje na webov\u00fa str\u00e1nku, ktor\u00fa n\u00e1sledne nav\u0161t\u00edvi neo\u010dak\u00e1vane ve\u013ek\u00fd po\u010det pou\u017e\u00edvate\u013eov internetu, \u010d\u00edm pre\u0165a\u017e\u00ed backendov\u00fa infra\u0161trukt\u00faru.<\/p>\n\n\n\n<p>Zatia\u013e \u010do mnoh\u00e9 komer\u010dn\u00e9 webov\u00e9 str\u00e1nky t\u00fato kapacitu zvl\u00e1dnu, slu\u017eba prev\u00e1dzkovan\u00e1 jednotlivcom alebo malou firmou m\u00f4\u017ee utrpie\u0165 v\u00fdpadok. Samotn\u00fd prev\u00e1dzkov\u00fd tok je v\u00fdsledkom zvedavosti tis\u00edcov jednotlivcov a nie je jeho z\u00e1merom odmietnu\u0165 slu\u017ebu, ale nakoniec k tomu doch\u00e1dza kv\u00f4li popularite danej str\u00e1nky. Jeden pr\u00edklad toho zdokumentoval Ibrahim Diallo, ktor\u00fd vyu\u017eil svoje predch\u00e1dzaj\u00face <a href=\"https:\/\/idiallo.com\/blog\/surviving-the-hug-of-death\">sk\u00fasenosti so zr\u00faten\u00edm svojho vlastn\u00e9ho blogu v d\u00f4sledku vir\u00e1lneho \u0161\u00edrenia \u010dl\u00e1nku<\/a>, ktor\u00fd nap\u00edsal, aby sledoval a zdokumentoval \u010fal\u0161iu prev\u00e1dzkov\u00fa vlnu v d\u00f4sledku toho, \u017ee jeden z jeho \u010dl\u00e1nkov sa dostal na tituln\u00fa stranu Hacker News.<\/p>\n\n\n\n<p>\u010eal\u0161\u00edm pr\u00edkladom je str\u00e1nka kanadskej vl\u00e1dy venovan\u00e1 imigr\u00e1cii, ktor\u00e1 bola po\u010das volieb prezidenta USA v roku 2016 z ve\u013ekej \u010dasti nedostupn\u00e1 z d\u00f4vodu neo\u010dak\u00e1vane vysokej n\u00e1v\u0161tevnosti. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ako vyzer\u00e1 DDoS \u00fatok?<\/h2>\n\n\n\n<p>Spr\u00e1vcovia siete na va\u0161om pracovisku alebo u v\u00e1\u0161ho dom\u00e1ceho poskytovate\u013ea internetov\u00fdch slu\u017eieb maj\u00fa k dispoz\u00edcii mno\u017estvo n\u00e1strojov a \u0161kolen\u00ed, aby mohli rozpozna\u0165 DDoS \u00fatok. Medzi sign\u00e1ly patria n\u00e1hle n\u00e1rasty sie\u0165ovej prev\u00e1dzky, bu\u010f v neobvykl\u00fdch hodin\u00e1ch alebo pravidelne, ve\u013ek\u00e9 objemy prich\u00e1dzaj\u00face z jedn\u00e9ho rozsahu IP adries alebo n\u00e1hle zv\u00fd\u0161enie prev\u00e1dzky na konkr\u00e9tnych zariadeniach alebo zdrojoch. Probl\u00e9mom je, \u017ee niektor\u00e9 z t\u00fdchto pr\u00edznakov s\u00fa tie\u017e sympt\u00f3mami be\u017en\u00e9ho spr\u00e1vania na internete, tak\u017ee je \u013eahk\u00e9 dospie\u0165 k nespr\u00e1vnemu z\u00e1veru, \u017ee prebieha DDoS \u00fatok, ke\u010f to m\u00f4\u017ee by\u0165 len niekto, kto s\u0165ahuje film vo vysokom rozl\u00ed\u0161en\u00ed zo streamovacej slu\u017eby cez nestabiln\u00e9 Wi-Fi pripojenie vo va\u0161ej kancel\u00e1rii.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">V\u00fdznamn\u00e9 incidenty DDoS<\/h2>\n\n\n\n<p>U\u017e sme spomenuli Mirai a \u00fatok na AWS, ktor\u00fd sp\u00f4sobil najvy\u0161\u0161iu hodnotu prev\u00e1dzky, ak\u00e1 bola v tom \u010dase zaznamenan\u00e1. \u00datok na Microsoft Azure, ktor\u00fd je spolu s AWS a Google Cloud Platform jedn\u00fdm z troch najv\u00e4\u010d\u0161\u00edch poskytovate\u013eov cloudov\u00fdch slu\u017eieb na svete, dosiahol v novembri 2021 vrchol 3,47 terabitov za sekundu.<\/p>\n\n\n\n<p>Medzi \u010fal\u0161ie v\u00fdznamn\u00e9 \u00fatoky patr\u00ed \u00fatok na Dyn DNS v okt\u00f3bri 2016, ktor\u00fd bol zameran\u00fd na spolo\u010dnos\u0165 Dyn, poskytovate\u013ea slu\u017eieb pre viacer\u00e9 v\u00fdznamn\u00e9 internetov\u00e9 zdroje a aplik\u00e1cie, vr\u00e1tane Twitteru, Airbnb a Spotify. \u010eal\u0161\u00ed \u00fatok v roku 2018 bol zameran\u00fd na GitHub a dosiahol vrchol 1,35 terabitu za sekundu v infra\u0161trukt\u00fare Githubu. V tomto pr\u00edpade \u00fato\u010dn\u00edci zneu\u017eili Memcached, popul\u00e1rny distribuovan\u00fd cache syst\u00e9m s otvoren\u00fdm zdrojov\u00fdm k\u00f3dom, aby zosilnili svoj \u00fatok.<\/p>\n\n\n\n<p>Pozoruhodn\u00e1 je aj in\u00e1 forma DDoS \u00fatoku: \u00fatok vykonan\u00fd na politick\u00e9 \u00fa\u010dely. Od anexie Krymu Ruskom a\u017e po rozsiahlu inv\u00e1ziu Ruska na Ukrajinu v roku 2022 boli ukrajinsk\u00e9 verejn\u00e9 slu\u017eby, telekomunik\u00e1cie, energetika, m\u00e9di\u00e1, finan\u010dn\u00fd sektor, podnikate\u013esk\u00fd sektor a neziskov\u00fd sektor ter\u010dom rozsiahlych kybernetick\u00fdch \u00fatokov, vr\u00e1tane DDoS \u00fatokov. \u00dato\u010dn\u00edci boli tie\u017e ve\u013emi rozpt\u00fdlen\u00ed, pri\u010dom skupiny spojen\u00e9 s Ruskom outsourcovali niektor\u00e9 \u00fatoky krimin\u00e1lnym skupin\u00e1m, ktor\u00e9 boli za \u00faspe\u0161n\u00e9 \u00fatoky odmenen\u00e9 kryptomenou.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Obrana proti DDoS \u00fatokom<\/h2>\n\n\n\n<p>Existuje mno\u017estvo n\u00e1strojov a slu\u017eieb, ktor\u00e9 pom\u00e1haj\u00fa zmier\u0148ova\u0165 DDoS \u00fatoky, ale probl\u00e9mom je, \u017ee \u017eiadny z nich nerie\u0161i v\u0161etky potenci\u00e1lne cesty \u00fatoku a \u00fato\u010dn\u00edci na\u010falej vyv\u00edjaj\u00fa nov\u00e9 techniky a vyu\u017e\u00edvaj\u00fa nov\u00e9 legit\u00edmne slu\u017eby a technol\u00f3gie na zv\u00fd\u0161enie svojej efekt\u00edvnosti.<\/p>\n\n\n\n<p>DDoS \u00fatoky s\u00fa svojou povahou \u0165a\u017eko rie\u0161ite\u013en\u00e9, aj ke\u010f ich sympt\u00f3my je mo\u017en\u00e9 lie\u010di\u0165 s v\u00e4\u010d\u0161ou alebo men\u0161ou \u00fa\u010dinnos\u0165ou.<\/p>\n\n\n\n<p>Cloudov\u00e9 slu\u017eby, ako s\u00fa AWS, Azure a GCP, s\u00fa \u010dasto ter\u010dom \u00fatokov, ale z\u00e1rove\u0148 poskytuj\u00fa slu\u017eby ako AWS Shield a Microsoft Azure DDoS na ochranu svojich z\u00e1kazn\u00edkov pred pre\u0165a\u017een\u00edm ne\u017eelanou prev\u00e1dzkou. <\/p>\n\n\n\n<p>Prekvapivo \u00fa\u010dinn\u00e9 s\u00fa aj niektor\u00e9 tradi\u010dnej\u0161ie lok\u00e1lne funkcie. <strong>Webov\u00e9 aplika\u010dn\u00e9 firewally (WAF) <\/strong>do ur\u010ditej miery chr\u00e1nia pred \u00fatokmi na aplika\u010dnej vrstve. Vstavan\u00e9 obmedzenie r\u00fdchlosti, filter prev\u00e1dzky a kontroly vstupu m\u00f4\u017eu zmierni\u0165 dopad \u00fatoku, hoci niekedy s rizikom odmietnutia legit\u00edmnej prev\u00e1dzky. Na architektonickej \u00farovni m\u00f4\u017eu \u00fa\u010dinky zmierni\u0165 redundantn\u00e9 DNS opatrenia, distribuovan\u00e9 d\u00e1tov\u00e9 centr\u00e1 a modern\u00e9 sie\u0165ov\u00e9 architekt\u00fary navrhnut\u00e9 s oh\u013eadom na odolnos\u0165.<\/p>\n\n\n\n<p><strong>\u0160pecializovan\u00e1 ochrana proti DDoS \u00fatokom<\/strong>, ktor\u00fa poskytuje mnoho ve\u013ek\u00fdch poskytovate\u013eov slu\u017eieb, telekomunika\u010dn\u00fdch oper\u00e1torov, poskytovate\u013eov internetov\u00fdch slu\u017eieb a poskytovate\u013eov spravovan\u00fdch slu\u017eieb, m\u00f4\u017ee tie\u017e zmierni\u0165 dopad DDoS \u00fatokov. Cloudflare, Akamai a in\u00e9 siete na doru\u010dovanie obsahu poskytuj\u00fa dodato\u010dn\u00fa sie\u0165ov\u00fa kapacitu na absorbovanie abnorm\u00e1lnych v\u00fdkyvov \u0161\u00edrky p\u00e1sma.<\/p>\n\n\n\n<p><strong>Poskytovatelia internetov\u00fdch slu\u017eieb a org\u00e1ny \u010dinn\u00e9 v trestnom konan\u00ed <\/strong>m\u00f4\u017eu by\u0165 po\u010das \u00fatoku cenn\u00fdmi partnermi, ktor\u00ed pom\u00e1haj\u00fa identifikova\u0165 a blokova\u0165 \u0161kodliv\u00fa prev\u00e1dzku a v kone\u010dnom d\u00f4sledku identifikova\u0165 a rozlo\u017ei\u0165 botnety.<\/p>\n\n\n\n<p><strong>Kontaktovanie n\u00e1rodn\u00fdch centier pre kybernetick\u00fa bezpe\u010dnos\u0165<\/strong> alebo podobn\u00fdch organiz\u00e1ci\u00ed v krajin\u00e1ch, kde podnik\u00e1te, m\u00f4\u017ee tie\u017e prinies\u0165 u\u017eito\u010dn\u00e9 zdroje inform\u00e1ci\u00ed a odborn\u00fdch znalost\u00ed.<\/p>\n\n\n\n<p>Nakoniec, spr\u00e1vne <strong>pl\u00e1novanie reakcie na incidenty a kr\u00edzov\u00e9 cvi\u010denia<\/strong> s\u00fa mimoriadne u\u017eito\u010dn\u00e9, preto\u017ee poskytuj\u00fa v\u00e1\u0161mu t\u00edmu a partnerom inform\u00e1cie a pokyny, aby vedeli, \u010do a kedy robi\u0165 v pr\u00edpade \u00fatoku.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010co prinesie bud\u00facnos\u0165 v oblasti ochrany pred DDoS \u00fatokmi<\/h2>\n\n\n\n<p>Rovnako ako v mnoh\u00fdch oblastiach kybernetickej bezpe\u010dnosti, aj prevencia a ochrana pred DDoS \u00fatokmi je neust\u00e1lou hrou na ma\u010dku a my\u0161, v ktorej obrancovia aj \u00fato\u010dn\u00edci neust\u00e1le inovuj\u00fa. Preto sa oplat\u00ed budova\u0165 odolnos\u0165 vo va\u0161ej organiz\u00e1cii, t\u00edme a medzi spriaznen\u00fdmi technologick\u00fdmi partnermi, namiesto toho, aby ste sa up\u00ednali na m\u00fdtick\u00fa z\u00e1zra\u010dn\u00fa zbra\u0148, ktor\u00e1 probl\u00e9m vyrie\u0161i raz a nav\u017edy. Ak je nie\u010do ist\u00e9, tak to, \u017ee r\u00f4zne typy \u00fatokov typu Denial of Service (odmietnutie slu\u017eby) nikam nezmizn\u00fa a obrana sa bude musie\u0165 vyv\u00edja\u0165, aby dok\u00e1zala reagova\u0165 na nov\u00e9 triky \u00fato\u010dn\u00edkov.<\/p>\n\n\n\n<p>S oh\u013eadom na t\u00fato v\u00fdzvu stoj\u00ed za to zv\u00e1\u017ei\u0165, \u010do tvor\u00ed odoln\u00fd pr\u00edstup k obrane proti DDoS. Reakt\u00edvna obrana jednoducho nesta\u010d\u00ed. Organiz\u00e1cie sa namiesto toho musia zamera\u0165 na komplexn\u00fa obranu, ktor\u00e1 pokr\u00fdva \u010do najviac ciest a vektorov \u00fatokov s dostupn\u00fdmi n\u00e1strojmi a slu\u017ebami, vykon\u00e1va proakt\u00edvne monitorovanie a zap\u00e1ja sa do pravideln\u00e9ho pl\u00e1novania incidentov v s\u00falade s v\u00fdvojom takt\u00edk a n\u00e1strojov \u00fato\u010dn\u00edkov.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00datoky DDoS s\u00fa mimoriadne hlu\u010dnou s\u00fa\u010das\u0165ou kyberkriminality \u2013 ich cie\u013eom je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. V tomto \u010dl\u00e1nku podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165. V\u00e4\u010d\u0161ina kybernetick\u00fdch \u00fatokov je z\u00e1kern\u00e1. Je \u0165a\u017ek\u00e9 ich odhali\u0165, k\u00fdm nie je neskoro, preto\u017ee \u00fato\u010dn\u00edci nechc\u00fa, aby ich obete vedeli, \u017ee s\u00fa nap\u00e1dan\u00e9. Existuje na to nieko\u013eko d\u00f4vodov. \u00dato\u010dn\u00edci chc\u00fa zosta\u0165 neodhalen\u00ed, k\u00fdm&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6467,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[140,105],"tags":[],"class_list":["post-6465","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desifrujeme-pre-vas","category-firemna-bezpecnost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Podrobne o \u00fatokoch DDoS: ako funguj\u00fa a ako sa chr\u00e1ni\u0165? | ESET<\/title>\n<meta name=\"description\" content=\"Cie\u013eom DDoS \u00fatokov je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. Podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Podrobne o \u00fatokoch DDoS: ako funguj\u00fa a ako sa chr\u00e1ni\u0165? | ESET\" \/>\n<meta property=\"og:description\" content=\"Cie\u013eom DDoS \u00fatokov je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. Podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-22T15:45:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T15:47:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1244\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Podrobne o DDoS \u00fatokoch: ako funguj\u00fa a ako sa pred nimi chr\u00e1ni\u0165?\",\"datePublished\":\"2026-01-22T15:45:15+00:00\",\"dateModified\":\"2026-01-22T15:47:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/\"},\"wordCount\":3417,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/ddos-attacks-1.jpg\",\"articleSection\":[\"De\u0161ifrujeme pre v\u00e1s\",\"Firemn\u00e1 bezpe\u010dnos\u0165\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/\",\"name\":\"Podrobne o \u00fatokoch DDoS: ako funguj\u00fa a ako sa chr\u00e1ni\u0165? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/ddos-attacks-1.jpg\",\"datePublished\":\"2026-01-22T15:45:15+00:00\",\"dateModified\":\"2026-01-22T15:47:53+00:00\",\"description\":\"Cie\u013eom DDoS \u00fatokov je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. Podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/ddos-attacks-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/ddos-attacks-1.jpg\",\"width\":1244,\"height\":700,\"caption\":\"BVF DDoS ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Podrobne o DDoS \u00fatokoch: ako funguj\u00fa a ako sa pred nimi chr\u00e1ni\u0165?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Podrobne o \u00fatokoch DDoS: ako funguj\u00fa a ako sa chr\u00e1ni\u0165? | ESET","description":"Cie\u013eom DDoS \u00fatokov je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. Podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/","og_locale":"sk_SK","og_type":"article","og_title":"Podrobne o \u00fatokoch DDoS: ako funguj\u00fa a ako sa chr\u00e1ni\u0165? | ESET","og_description":"Cie\u013eom DDoS \u00fatokov je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. Podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2026-01-22T15:45:15+00:00","article_modified_time":"2026-01-22T15:47:53+00:00","og_image":[{"width":1244,"height":700,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1.jpg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"15 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Podrobne o DDoS \u00fatokoch: ako funguj\u00fa a ako sa pred nimi chr\u00e1ni\u0165?","datePublished":"2026-01-22T15:45:15+00:00","dateModified":"2026-01-22T15:47:53+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/"},"wordCount":3417,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1.jpg","articleSection":["De\u0161ifrujeme pre v\u00e1s","Firemn\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/","name":"Podrobne o \u00fatokoch DDoS: ako funguj\u00fa a ako sa chr\u00e1ni\u0165? | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1.jpg","datePublished":"2026-01-22T15:45:15+00:00","dateModified":"2026-01-22T15:47:53+00:00","description":"Cie\u013eom DDoS \u00fatokov je zaplavi\u0165, zr\u00fati\u0165 a ochromi\u0165 online slu\u017eby. Podrobne vysvet\u013eujeme ako funguj\u00fa a ako sa m\u00f4\u017eete chr\u00e1ni\u0165.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/01\/ddos-attacks-1.jpg","width":1244,"height":700,"caption":"BVF DDoS ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/podrobne-o-ddos-utokoch-ako-funguju-a-ako-sa-pred-nimi-chranit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Podrobne o DDoS \u00fatokoch: ako funguj\u00fa a ako sa pred nimi chr\u00e1ni\u0165?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6465"}],"version-history":[{"count":3,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6465\/revisions"}],"predecessor-version":[{"id":6470,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6465\/revisions\/6470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6467"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}