
{"id":4798,"date":"2023-06-24T11:50:47","date_gmt":"2023-06-24T09:50:47","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=4798"},"modified":"2023-06-24T11:52:31","modified_gmt":"2023-06-24T09:52:31","slug":"quest-ce-quune-attaque-ddos","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/","title":{"rendered":"Qu\u2019est-ce qu\u2019une attaque DDoS ?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-38.png\" alt=\"\" class=\"wp-image-4799\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-38.png 768w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-38-300x169.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Une attaque par d\u00e9ni de service distribu\u00e9, ou DDoS, est le nom que l&rsquo;on donne \u00e0 une technique d&rsquo;attaque informatique. <\/strong><\/p>\n\n\n\n<p>Elle vise \u00e0 envoyer de nombreuses requ\u00eates sur un service (un site web, une application) depuis plusieurs machines afin d\u2019en perturber le bon fonctionnement. Une menace pour la cybers\u00e9curit\u00e9 aux multiples usages. Voici tout ce qu&rsquo;il faut savoir sur les attaques DDoS.<\/p>\n\n\n\n<p>Avec le&nbsp;<em>malware<\/em>, le&nbsp;<em>ransomware<\/em>&nbsp;et le&nbsp;<em>phishing<\/em>, l\u2019attaque DDoS fait partie des menaces les plus r\u00e9pandues sur Internet. Relativement simple \u00e0 mettre en place, elle est utilis\u00e9e aussi bien par des hackers en herbe que par&nbsp;<a href=\"https:\/\/www.frandroid.com\/tag\/piratage\" target=\"_blank\" rel=\"noreferrer noopener\">des pirates exp\u00e9riment\u00e9s<\/a>, des organisations criminelles, des collectifs politiques et m\u00eame certains gouvernements.<\/p>\n\n\n\n<p>Extorsion de fonds, paralysie d\u2019un service, sabotage intentionnel, cyberharc\u00e8lement, les usages d\u2019une attaque DDoS sont nombreux. Voici tout ce qu\u2019il faut savoir sur cette attaque informatique malveillante.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Une attaque DDoS (Attaque par d\u00e9ni de service), qu\u2019est-ce que c\u2019est\u2009?<\/h2>\n\n\n\n<p>Une attaque par d\u00e9ni de service (DoS pour\u00a0<em>Denial of Service<\/em>) consiste \u00e0 inonder de donn\u00e9es la bande passante ou l\u2019infrastructure r\u00e9seau d\u2019un service, comme un site Web, une application, un r\u00e9seau informatique ou m\u00eame un unique ordinateur. Le but est d\u2019en alt\u00e9rer le bon fonctionnement, de le saturer de requ\u00eates,\u00a0au point de le rendre inaccessible.<\/p>\n\n\n\n<p>Le plus souvent, ce type d\u2019attaque est men\u00e9 depuis plusieurs machines, afin de multiplier le nombre de requ\u00eates. On parle alors d\u2019attaque collective par saturation de service, ou plus commun\u00e9ment d\u2019attaque par d\u00e9ni de service distribu\u00e9. D\u2019o\u00f9 l\u2019acronyme DDoS, pour&nbsp;<em>Distributed Denial of Service<\/em>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment fonctionne une attaque DDoS\u2009?<\/h2>\n\n\n\n<p>Pour pr\u00e9parer une attaque DDoS, le pirate corrompt une s\u00e9rie de machines connect\u00e9es en les infectant avec un ou plusieurs\u00a0<em>malware.\u00a0<\/em>Lorsqu\u2019une attaque DDoS est lanc\u00e9e, le r\u00e9seau de machines infect\u00e9es envoie un nombre tr\u00e8s \u00e9lev\u00e9 de requ\u00eates vers un seul et m\u00eame service. Celui-ci est alors noy\u00e9 sous les requ\u00eates, des paquets de donn\u00e9es, ce qui paralyse le ou les serveurs qui sont incapables de traiter le trafic classique. Il s\u2019agit ici d\u2019une attaque \u201cvolum\u00e9trique\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"513\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-39.png\" alt=\"\" class=\"wp-image-4800\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-39.png 768w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-39-300x200.png 300w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-39-180x120.png 180w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>Une attaque DDoS peut aussi cibler le r\u00e9seau directement, pour emp\u00eacher une personne sp\u00e9cifique d\u2019acc\u00e9der \u00e0 un service par exemple. L\u2019attaque dite\u00a0<em>Syn Flood<\/em>\u00a0vise ainsi le protocole TCP, qui se charge d\u2019assurer la connexion entre un syst\u00e8me (client) et un service (serveur). Le fonctionnement de ce protocole TCP est simple\u00a0: dans un premier temps, le client g\u00e9n\u00e8re un message SYN vers le serveur qu\u2019il vise. Ce dernier lui r\u00e9pond avec un message SYN-ACK. L\u2019\u00e9change se conclut par un message ACK du client afin d\u2019\u00e9tablir d\u00e9finitivement la connexion.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>L\u2019attaque, elle, intervient dans cet \u00e9change. Elle bombarde le serveur de requ\u00eates SYN, occupant ainsi tous les ports d\u2019entr\u00e9e dudit serveur. Aucune autre connexion ne peut donc avoir lieu, emp\u00eachant le client d\u2019acc\u00e9der au service.<\/p>\n\n\n\n<p>Parmi les autres types d\u2019attaques DDoS, on trouve l\u2019<em>UDP Flooding<\/em>\u00a0(qui sature la bande passante entre deux machines), le\u00a0<em>Packet Fragment<\/em>\u00a0(qui vise la d\u00e9fragmentation au niveau IP pour faire crasher une machine) ou encore l\u2019attaque DDoS de couche 7 (qui cible et perturbe des applications Web sp\u00e9cifiques et non un r\u00e9seau entier).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Qui fait des DDoS et \u00e0 quoi \u00e7a sert ?<\/h2>\n\n\n\n<p>Gr\u00e2ce \u00e0 la facilit\u00e9 de sa mise en place, l\u2019attaque DDoS est tr\u00e8s populaire aupr\u00e8s des hackers malveillants. \u00c0 commencer par les organisations criminelles, qui utilisent les attaques DDoS contre des entreprises dont l\u2019activit\u00e9 commerciale passe par le Web. Un chantage financier est lanc\u00e9 contre la promesse de ne pas paralyser les services Internet.<\/p>\n\n\n\n<p>Une entreprise peut \u00e9galement se servir d\u2019une attaque DDoS pour brider l\u2019activit\u00e9 d\u2019une entit\u00e9 concurrente, et par cons\u00e9quent, la couler financi\u00e8rement.<\/p>\n\n\n\n<p>L\u2019attaque DDoS sert parfois de leurre \u00e0 une autre attaque d\u2019envergure, comme l\u2019installation d\u2019un\u00a0<em>ransomware<\/em>\u00a0ou le pillage de donn\u00e9es priv\u00e9es.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"439\" src=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-40.png\" alt=\"\" class=\"wp-image-4801\" srcset=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-40.png 768w, https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/image-40-300x171.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>On retrouve aussi les attaques DDoS dans des actions politiques. Les \u00ab\u2009hacktivistes\u2009\u00bb peuvent s\u2019appuyer sur l\u2019attaque DDoS pour \u00ab\u2009punir\u2009\u00bb une grosse multinationale par exemple, rendre inaccessible un service d\u2019\u00e9tat ou couper les canaux de communication d\u2019un groupe adverse.<\/p>\n\n\n\n<p>Enfin, certains pays font usage de l\u2019attaque DDoS pour entraver les services d\u2019un autre pays, et ainsi d\u00e9stabiliser l\u2019action du gouvernement cibl\u00e9. Aux premi\u00e8res heures de la guerre en Ukraine, la Russie a \u00e9t\u00e9 accus\u00e9e d\u2019avoir lanc\u00e9 de nombreuses attaques DDoS contre les services administratifs et bancaires ukrainiens.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment se prot\u00e9ger d\u2019une attaque DDoS ?<\/h2>\n\n\n\n<p>Par d\u00e9finition, il est difficile de contrer une attaque DDoS en cours. Celle-ci envoyant une multitude de requ\u00eates depuis de nombreuses machines aux adresses diff\u00e9rentes, il est presque impossible de bloquer toutes les adresses IP. L\u2019attaque est au mieux limit\u00e9e, mais reste ininterrompue.<\/p>\n\n\n\n<p>En revanche, il est tout \u00e0 fait possible de se pr\u00e9munir contre une attaque DDoS. Certaines entreprises,\u00a0comme Cloudflare, proposent des \u00ab\u00a0serveurs tampons\u00a0\u00bb pour d\u00e9vier les attaques. Concr\u00e8tement, il s\u2019agit de rediriger les requ\u00eates vers un serveur vide, qui \u00e9puisera l\u2019attaque afin de prot\u00e9ger le serveur vis\u00e9 de la surcharge.<\/p>\n\n\n\n<p>avec frandroid<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une attaque par d\u00e9ni de service distribu\u00e9, ou DDoS, est le nom que l&rsquo;on donne \u00e0 une technique d&rsquo;attaque informatique. Elle vise \u00e0 envoyer de nombreuses requ\u00eates sur un service [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4803,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,117,11],"tags":[],"class_list":["post-4798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-ckoi","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs\" \/>\n<meta property=\"og:description\" content=\"Une attaque par d\u00e9ni de service distribu\u00e9, ou DDoS, est le nom que l&rsquo;on donne \u00e0 une technique d&rsquo;attaque informatique. Elle vise \u00e0 envoyer de nombreuses requ\u00eates sur un service [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-24T09:50:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-24T09:52:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/social-20.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/social-20.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Qu\u2019est-ce qu\u2019une attaque DDoS ?\",\"datePublished\":\"2023-06-24T09:50:47+00:00\",\"dateModified\":\"2023-06-24T09:52:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/\"},\"wordCount\":923,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/ab-19.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Ckoi\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/\",\"name\":\"Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/ab-19.jpg\",\"datePublished\":\"2023-06-24T09:50:47+00:00\",\"dateModified\":\"2023-06-24T09:52:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/ab-19.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/ab-19.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2023\\\/06\\\/24\\\/quest-ce-quune-attaque-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qu\u2019est-ce qu\u2019une attaque DDoS ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/","og_locale":"fr_FR","og_type":"article","og_title":"Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs","og_description":"Une attaque par d\u00e9ni de service distribu\u00e9, ou DDoS, est le nom que l&rsquo;on donne \u00e0 une technique d&rsquo;attaque informatique. Elle vise \u00e0 envoyer de nombreuses requ\u00eates sur un service [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/","og_site_name":"Parlons Techs - Store","article_published_time":"2023-06-24T09:50:47+00:00","article_modified_time":"2023-06-24T09:52:31+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/social-20.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/social-20.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Qu\u2019est-ce qu\u2019une attaque DDoS ?","datePublished":"2023-06-24T09:50:47+00:00","dateModified":"2023-06-24T09:52:31+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/"},"wordCount":923,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/ab-19.jpg","articleSection":["Actualit\u00e9","Ckoi","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/","url":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/","name":"Qu\u2019est-ce qu\u2019une attaque DDoS ? - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/ab-19.jpg","datePublished":"2023-06-24T09:50:47+00:00","dateModified":"2023-06-24T09:52:31+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/ab-19.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2023\/06\/ab-19.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2023\/06\/24\/quest-ce-quune-attaque-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Qu\u2019est-ce qu\u2019une attaque DDoS ?"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/4798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=4798"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/4798\/revisions"}],"predecessor-version":[{"id":4802,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/4798\/revisions\/4802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/4803"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=4798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=4798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=4798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}