{"id":3052,"date":"2023-03-13T09:00:26","date_gmt":"2023-03-13T08:00:26","guid":{"rendered":"https:\/\/plansysteme.com\/?p=3052"},"modified":"2023-03-27T12:48:33","modified_gmt":"2023-03-27T10:48:33","slug":"denial-of-service-ddos","status":"publish","type":"post","link":"https:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/","title":{"rendered":"Denial of Service (DDoS)"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Mit HoloLens2 bieten Microsoft und seine Cloud-Computing-Plattform Azure neue Wege, Kreativit\u00e4t digital und intelligent auszuleben. Eine sichere Verf\u00fcgbarkeit der bereitgestellten Dienste ist f\u00fcr Firmen aller Gr\u00f6\u00dfen und Branchen wichtig. Hier kommt Azure mittlerweile auch kleineren Betrieben entgegen, die gegen einen geringen Betrag einen umfassenden Schutz vor einem Distributed Denial of Service (DDoS) erhalten.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-2\"><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-black ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Inhaltsverzeichnis<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#HoloLens_2_%E2%80%93_Erfolgsgeschichte_mit_geplanter_Ausweitung\" >HoloLens 2 \u2013 Erfolgsgeschichte mit geplanter Ausweitung<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#Mit_DDoS_IP_Protection_besser_geschuetzt\" >Mit DDoS IP Protection besser gesch\u00fctzt<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#Finanzielle_Auswirkungen_der_Denial_of_Service_Abwehr\" >Finanzielle Auswirkungen der Denial of Service Abwehr<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#Fragen_und_Antworten_zu_Denial_of_Service\" >Fragen und Antworten zu Denial of Service<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"HoloLens_2_%E2%80%93_Erfolgsgeschichte_mit_geplanter_Ausweitung\"><\/span>HoloLens 2 \u2013 Erfolgsgeschichte mit geplanter Ausweitung<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Deutschland geh\u00f6rte urspr\u00fcnglich zu einer Handvoll von Nationen, in denen <a href=\"https:\/\/hololens-partner.de\/de\/\" target=\"_blank\" rel=\"noopener\">HoloLens 2<\/a> als Unternehmensanwendung von Microsoft verf\u00fcgbar gemacht wurde. Der Ansatz, durch <a href=\"https:\/\/hololens-partner.de\/de\/hololens\/virtual-reality-vr-was-ist-das\/\" target=\"_blank\" rel=\"noopener\">Virtual Reality<\/a> und <a href=\"https:\/\/plansysteme.com\/de\/mixed-reality\/mixed-reality-macht-es-moeglich\/\" target=\"_blank\" rel=\"noopener\">Mixed Reality<\/a> den Service am Kunden oder Schulungen hausinterner Mitarbeiter zu f\u00f6rdern, hat sich in den Augen des US-Gro\u00dfkonzerns bew\u00e4hrt. Im Herbst 2020 erfolgte eine Erweiterung des Dienstes in weitere Nationen, mittlerweile ist der Mixed-Reality-Clouddienst \u00fcber Azure aus vielen Betrieben nicht mehr fortzudenken.<\/p>\n<p>Immersive 3D-Anwendungen oder Apps f\u00fcr Smartphones, die Technologien im Bereich <a href=\"https:\/\/hololens-partner.de\/de\/augmented-reality\/was-ist-augmented-reality\/\" target=\"_blank\" rel=\"noopener\">Augmented Reality<\/a> unterst\u00fctzen, sind nur einige Aspekte, die HoloLens 2 als Dienst abdeckt. F\u00fcr Unternehmen, die auf die Cloud-Anwendung vertrauen, spielt vor allem die sichere Verf\u00fcgbarkeit des Serviceangebots an Kunden und Mitarbeiter eine Rolle. Um den Denial of Service durch cyberkriminelle Attacken zu verhindern, hat Azure Ende 2022 eine Ausweitung seines Services angek\u00fcndigt.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-3\"><h2><span class=\"ez-toc-section\" id=\"Mit_DDoS_IP_Protection_besser_geschuetzt\"><\/span>Mit DDoS IP Protection besser gesch\u00fctzt<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"alignleft wp-image-3083 size-fusion-400\" src=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/DoS-400x518.webp\" alt=\"DoS\" width=\"400\" height=\"518\" srcset=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/DoS-200x259.webp 200w, https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/DoS-232x300.webp 232w, https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/DoS-400x518.webp 400w, https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/DoS.webp 581w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>Der Denial of Service (DoS) geh\u00f6rt mittlerweile zu den h\u00e4ufigsten Attacken der Cyberkriminalit\u00e4t. Gezielt wird versucht, Anwendungen und digitale Services au\u00dfer Betrieb zu setzen, wobei sich die Wege der Angriffe oft nur schwer nachvollziehen lassen. Ping Flooding oder Mailbombing sind vertraute Vorgehensweise im DoS, um Server und weitere <a href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/it-infrastruktur-was-versteht-man-darunter\/\" target=\"_blank\" rel=\"noopener\">IT-Infrastrukturen<\/a> zu \u00fcberfordern und lahmzulegen.<\/p>\n<p>Beim Distributed Denial of Service (DDoS) umfasst der DoS Angriff eine Vielzahl von Rechnern in einem Netzwerk. Hier werden k\u00fcnstlich die Datenkan\u00e4le zwischen den Ger\u00e4ten geflutet, um das gesamte System zu \u00fcberfordern. Zur DoS Abwehr hat Azure mit DDoS IP Protection eine L\u00f6sung angek\u00fcndigt, die auch f\u00fcr kleinere Betriebe und selbst den privaten Anwender je nach Bedarf \u00fcberzeugen soll.<\/p>\n<p>Der Schutz der neuen Microsoft-SKU soll hinunter bis zur IP und somit jedem einzelnen Endnutzerger\u00e4t bestehen. Dies gibt einzelnen Anwendern das Vertrauen, auf die angebotenen Dienste einer Firma zu setzen, die mittels HoloLens 2 entwickelt wurden und beispielsweise als App bereitgestellt werden.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-4\"><div class=\"BorlabsCookie _brlbs-cb-youtube\"><div class=\"_brlbs-content-blocker\"> <div class=\"_brlbs-embed _brlbs-video-youtube\"> <img class=\"_brlbs-thumbnail\" src=\"https:\/\/plansysteme.com\/wp-content\/plugins\/borlabs-cookie\/assets\/images\/cb-no-thumbnail.png\" alt=\"YouTube\"> <div class=\"_brlbs-caption\"> <p>Mit dem Laden des Videos akzeptieren Sie die Datenschutzerkl\u00e4rung von YouTube.<br><a href=\"https:\/\/policies.google.com\/privacy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Mehr erfahren<\/a><\/p> <p><a class=\"_brlbs-btn _brlbs-icon-play-white\" href=\"#\" data-borlabs-cookie-unblock role=\"button\">Video laden<\/a><\/p> <p><label><input type=\"checkbox\" name=\"unblockAll\" value=\"1\" checked> <small>YouTube immer entsperren<\/small><\/label><\/p> <\/div> <\/div> <\/div><div class=\"borlabs-hide\" data-borlabs-cookie-type=\"content-blocker\" data-borlabs-cookie-id=\"youtube\"><script type=\"text\/template\">PHA+PGlmcmFtZSB0aXRsZT0iRGVuaWFsIG9mIFNlcnZpY2UiIHNyYz0iaHR0cHM6Ly93d3cueW91dHViZS1ub2Nvb2tpZS5jb20vZW1iZWQvRDB2UjZZTlJDd3ciIHdpZHRoPSIxMDAlIiBoZWlnaHQ9IjYwMCIgZnJhbWVib3JkZXI9IjAiIGFsbG93ZnVsbHNjcmVlbj0iYWxsb3dmdWxsc2NyZWVuIj48L2lmcmFtZT48L3A+<\/script><\/div><\/div>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-5\"><h2><span class=\"ez-toc-section\" id=\"Finanzielle_Auswirkungen_der_Denial_of_Service_Abwehr\"><\/span>Finanzielle Auswirkungen der Denial of Service Abwehr<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Wie sich die umfassende Denial of Service Abwehr finanziell auswirkt und f\u00fcr kleinere Unternehmen interessant wird, bleibt aktuell noch abzuwarten. Der professionelle Schutz aller Azure-Ressourcen bewegt sich aktuell monatlich im vierstelligen Eurobereich und richtet sich erkennbar an gr\u00f6\u00dfere Unternehmen. Hier eine Alternative f\u00fcr kleine Firmen und Entwickler zu schaffen, d\u00fcrfte die Ausbreitung von HoloLens 2-Services und -Apps f\u00f6rdern und Anwendungen der Augmented Reality noch alltagstauglicher machen.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-no-small-visibility\" style=\"align-self: flex-start;margin-right:auto;margin-bottom:5px;width:100%;max-width:25px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#b51621;border-color:#b51621;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-6\"><p><span style=\"color: #b51621; font-size: 25.6px; font-family: 'Barlow Condensed',sans-serif; font-weight: 400;\">PLANSYSTEME<\/span><br \/>\n<span style=\"font-size: 28px; font-weight: bold;\">HABEN SIE IRGENDWELCHE FRAGEN? GERNE K\u00d6NNEN SIE UNS KONTAKTIEREN!<\/span><br \/>\nBitte z\u00f6gern Sie nicht uns zu kontaktieren. In einem ersten unverbindlichen Gespr\u00e4ch finden wir heraus, wie wir Ihnen helfen k\u00f6nnen und ob unsere L\u00f6sungen zu Ihren Bed\u00fcrfnissen passen. Wir freuen uns auf Sie!<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type Buttonkontakt\" style=\"--awb-margin-top:95px;--button_accent_color:#ffffff;--button_accent_hover_color:#ffffff;--button_border_hover_color:#212529;--button_gradient_top_color:#b51621;--button_gradient_bottom_color:#b51621;--button_gradient_top_color_hover:#212529;--button_gradient_bottom_color_hover:#212529;--button_text_transform:uppercase;\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Kontakt\" aria-label=\"Kontakt\" href=\"https:\/\/plansysteme.com\/de\/kontakt\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Kontakt<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-7\"><h2><span class=\"ez-toc-section\" id=\"Fragen_und_Antworten_zu_Denial_of_Service\"><\/span>Fragen und Antworten zu Denial of Service<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:19.2px;--awb-icon-alignment:left;--awb-hover-color:#f9f9fb;--awb-border-color:#e2e2e2;--awb-background-color:#ffffff;--awb-divider-color:#3e3e3e;--awb-divider-hover-color:#3e3e3e;--awb-icon-color:#ffffff;--awb-title-color:#b51621;--awb-content-color:#ffffff;--awb-icon-box-color:#3e3e3e;--awb-toggle-hover-accent-color:#b51621;--awb-title-font-family:&quot;Barlow Condensed&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-content-font-family:&quot;Muli&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-3052-1\"><div class=\"fusion-panel panel-default panel-73350f82d3d9e33ff fusion-toggle-has-divider\" style=\"--awb-title-color:#b51621;--awb-content-color:#ffffff;\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_73350f82d3d9e33ff\"><a aria-expanded=\"false\" aria-controls=\"73350f82d3d9e33ff\" role=\"button\" data-toggle=\"collapse\" data-target=\"#73350f82d3d9e33ff\" href=\"#73350f82d3d9e33ff\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Was ist der Unterschied zwischen DDoS und DoS?<\/span><\/a><\/h4><\/div><div id=\"73350f82d3d9e33ff\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_73350f82d3d9e33ff\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><em>Der Hauptunterschied ist, dass DDoS-Angriffe mehrere Systeme nutzen und schneller sind, w\u00e4hrend DoS-Angriffe ein einziges System nutzen und langsamer sind.<\/em><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-e8e30f0c6a129cbca fusion-toggle-has-divider\" style=\"--awb-title-color:#b51621;--awb-content-color:#ffffff;\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e8e30f0c6a129cbca\"><a aria-expanded=\"false\" aria-controls=\"e8e30f0c6a129cbca\" role=\"button\" data-toggle=\"collapse\" data-target=\"#e8e30f0c6a129cbca\" href=\"#e8e30f0c6a129cbca\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Wie funktioniert ein DoS Angriff?<\/span><\/a><\/h4><\/div><div id=\"e8e30f0c6a129cbca\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e8e30f0c6a129cbca\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><em>DDoS-Angriffe funktionieren immer nach dem gleichen Muster: Der Server (z. B. einer Website oder eines E-Mail-Dienstes) wird mit Anfragen \u00fcberflutet, bis er sie nicht mehr beantworten kann.<\/em><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-24d74b54484e4b73a fusion-toggle-has-divider\" style=\"--awb-title-color:#b51621;--awb-content-color:#ffffff;\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_24d74b54484e4b73a\"><a aria-expanded=\"false\" aria-controls=\"24d74b54484e4b73a\" role=\"button\" data-toggle=\"collapse\" data-target=\"#24d74b54484e4b73a\" href=\"#24d74b54484e4b73a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Ist DoS strafbar?<\/span><\/a><\/h4><\/div><div id=\"24d74b54484e4b73a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_24d74b54484e4b73a\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><em>DDoS-Angriffe sind in Deutschland als Computersabotage gem\u00e4\u00df \u00a7 303b StGB strafbar. Selbst die Vorbereitung eines DDoS-Angriffs ist strafbar und kann strafrechtlich verfolgt werden.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":3080,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[175,176,172,173,174],"class_list":["post-3052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","tag-ddos","tag-ddos-attacke","tag-denial-of-service","tag-distributed-denial-of-service","tag-dos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.11 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Denial of Service (DDoS) | Plansysteme<\/title>\n<meta name=\"description\" content=\"Bei einem Denial of Service-Angriff wird ein Server absichtlich mit so vielen Anfragen \u00fcberlastet, dass das System die Aufgaben nicht mehr...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Denial of Service (DDoS)\" \/>\n<meta property=\"og:description\" content=\"Bei einem Denial of Service-Angriff wird ein Server absichtlich mit so vielen Anfragen \u00fcberlastet, dass das System die Aufgaben nicht mehr...\" \/>\n<meta property=\"og:url\" content=\"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Plansysteme\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/login\/?next=httpswww.facebook.comPlansystemeGmbH\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-13T08:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T10:48:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/Denial-of-Service.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Sandra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sandra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"12\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#article\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/\"},\"author\":{\"name\":\"Sandra\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/person\\\/41afc55c60ec63ca2bafd962b8295993\"},\"headline\":\"Denial of Service (DDoS)\",\"datePublished\":\"2023-03-13T08:00:26+00:00\",\"dateModified\":\"2023-03-27T10:48:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/\"},\"wordCount\":2719,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Denial-of-Service.webp\",\"keywords\":[\"ddos\",\"ddos-attacke\",\"denial of service\",\"distributed denial of service\",\"dos\"],\"articleSection\":[\"Cloud Computing | Augmented Reality Industrie 4.0\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/\",\"url\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/\",\"name\":\"Denial of Service (DDoS) | Plansysteme\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Denial-of-Service.webp\",\"datePublished\":\"2023-03-13T08:00:26+00:00\",\"dateModified\":\"2023-03-27T10:48:33+00:00\",\"description\":\"Bei einem Denial of Service-Angriff wird ein Server absichtlich mit so vielen Anfragen \u00fcberlastet, dass das System die Aufgaben nicht mehr...\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Denial-of-Service.webp\",\"contentUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Denial-of-Service.webp\",\"width\":1000,\"height\":667,\"caption\":\"Denial of Service\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/denial-of-service-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Computing | Augmented Reality Industrie 4.0\",\"item\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/category\\\/cloud-computing\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Denial of Service (DDoS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/\",\"name\":\"Plansysteme\",\"description\":\"Software mit System\",\"publisher\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#organization\"},\"alternateName\":\"Plansysteme GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#organization\",\"name\":\"Plansysteme GmbH\",\"alternateName\":\"Plansysteme\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo-ohne-Reiter.png\",\"contentUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo-ohne-Reiter.png\",\"width\":725,\"height\":175,\"caption\":\"Plansysteme GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/login\\\/?next=httpswww.facebook.comPlansystemeGmbH\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/plansysteme-gmbh\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCG-FU-CijbCqIpbZcreuCZw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/person\\\/41afc55c60ec63ca2bafd962b8295993\",\"name\":\"Sandra\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Denial of Service (DDoS) | Plansysteme","description":"Bei einem Denial of Service-Angriff wird ein Server absichtlich mit so vielen Anfragen \u00fcberlastet, dass das System die Aufgaben nicht mehr...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/","og_locale":"de_DE","og_type":"article","og_title":"Denial of Service (DDoS)","og_description":"Bei einem Denial of Service-Angriff wird ein Server absichtlich mit so vielen Anfragen \u00fcberlastet, dass das System die Aufgaben nicht mehr...","og_url":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/","og_site_name":"Plansysteme","article_publisher":"https:\/\/www.facebook.com\/login\/?next=httpswww.facebook.comPlansystemeGmbH","article_published_time":"2023-03-13T08:00:26+00:00","article_modified_time":"2023-03-27T10:48:33+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/Denial-of-Service.webp","type":"image\/webp"}],"author":"Sandra","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Sandra","Gesch\u00e4tzte Lesezeit":"12\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#article","isPartOf":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/"},"author":{"name":"Sandra","@id":"https:\/\/plansysteme.com\/de\/#\/schema\/person\/41afc55c60ec63ca2bafd962b8295993"},"headline":"Denial of Service (DDoS)","datePublished":"2023-03-13T08:00:26+00:00","dateModified":"2023-03-27T10:48:33+00:00","mainEntityOfPage":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/"},"wordCount":2719,"commentCount":1,"publisher":{"@id":"https:\/\/plansysteme.com\/de\/#organization"},"image":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/Denial-of-Service.webp","keywords":["ddos","ddos-attacke","denial of service","distributed denial of service","dos"],"articleSection":["Cloud Computing | Augmented Reality Industrie 4.0"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/","url":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/","name":"Denial of Service (DDoS) | Plansysteme","isPartOf":{"@id":"https:\/\/plansysteme.com\/de\/#website"},"primaryImageOfPage":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#primaryimage"},"image":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/Denial-of-Service.webp","datePublished":"2023-03-13T08:00:26+00:00","dateModified":"2023-03-27T10:48:33+00:00","description":"Bei einem Denial of Service-Angriff wird ein Server absichtlich mit so vielen Anfragen \u00fcberlastet, dass das System die Aufgaben nicht mehr...","breadcrumb":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#primaryimage","url":"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/Denial-of-Service.webp","contentUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2023\/03\/Denial-of-Service.webp","width":1000,"height":667,"caption":"Denial of Service"},{"@type":"BreadcrumbList","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/denial-of-service-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/plansysteme.com\/de\/"},{"@type":"ListItem","position":2,"name":"Cloud Computing | Augmented Reality Industrie 4.0","item":"https:\/\/plansysteme.com\/de\/category\/cloud-computing\/"},{"@type":"ListItem","position":3,"name":"Denial of Service (DDoS)"}]},{"@type":"WebSite","@id":"https:\/\/plansysteme.com\/de\/#website","url":"https:\/\/plansysteme.com\/de\/","name":"Plansysteme","description":"Software mit System","publisher":{"@id":"https:\/\/plansysteme.com\/de\/#organization"},"alternateName":"Plansysteme GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/plansysteme.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/plansysteme.com\/de\/#organization","name":"Plansysteme GmbH","alternateName":"Plansysteme","url":"https:\/\/plansysteme.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/plansysteme.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/06\/Logo-ohne-Reiter.png","contentUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/06\/Logo-ohne-Reiter.png","width":725,"height":175,"caption":"Plansysteme GmbH"},"image":{"@id":"https:\/\/plansysteme.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/login\/?next=httpswww.facebook.comPlansystemeGmbH","https:\/\/www.linkedin.com\/company\/plansysteme-gmbh\/","https:\/\/www.youtube.com\/channel\/UCG-FU-CijbCqIpbZcreuCZw"]},{"@type":"Person","@id":"https:\/\/plansysteme.com\/de\/#\/schema\/person\/41afc55c60ec63ca2bafd962b8295993","name":"Sandra"}]}},"_links":{"self":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/posts\/3052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/comments?post=3052"}],"version-history":[{"count":15,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/posts\/3052\/revisions"}],"predecessor-version":[{"id":3285,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/posts\/3052\/revisions\/3285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/media\/3080"}],"wp:attachment":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/media?parent=3052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/categories?post=3052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/tags?post=3052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}