Uncategorized

A Look into the Gafgyt Botnet Trends from the Communication Traffic Log

July 23, 2019 | Adeline Zhang

About the Gafgyt Botnet Gafgyt is a long-lived IoT botnet family with a lot of variants. Over the years, it has grown into a gigantic family with the same notoriety as Mirai. Its variants are mature enough to provide capabilities of scanning vulnerabilities conducting DDoS, executing instructions, and downloading and executing malware.

Have Rich Game Customers Who Suffered DDoS Attacks Turned to You?

July 15, 2019 | Adeline Zhang

According to NSFOCUS 2018 DDoS Attack Trend Report, the gaming sector has become the second biggest victim of DDoS attacks, receiving 27.6% of the total number of attacks.

DDoS to Loom Large in the 5G Era

July 9, 2019 | Adeline Zhang

Today, 5G is around the corner and, in the foreseeable future, it will definitely bring more convenience to our lives. Higher rates of mobile terminals, more devices connected to the Internet of Things (IoT), more convenient remote services… All these will lead us to a brand new era of the Internet of Everything (IoE). With […]

BGP Hijackings Come Back!

July 5, 2019 | Adeline Zhang

A BGP hijacking event happened again! Following the event that the traffic supposed to be destined for Europe was leaked to China Telecom (June 9, 2019), another BGP hijacking occurred yesterday (June 25, 2019). Since Verizon, by mistake, accepted network misconfigurations by a minor Internet Service Provider (ISP), multiple Internet systems have fallen into a […]

DDoS in the Past Decade

July 1, 2019 | Adeline Zhang

1.0   Milestones 1.1   DDoS Size Expansion IP data source: The Zettabyte Era: Trends and Analysis The past decade has witnessed a steady growth in the peak size of DDoS attacks, especially in 2013 when the reflection method was used by attackers on a large scale and the DDoS attack size expanded at an exponential rate. […]

What You Should Know About Mitigation Bypass

June 28, 2019 | Adeline Zhang

Mitigation measures are implemented with many implicit assumptions. They can work only when these assumptions prove to be true and would be bypassed if these assumptions were broken.

The Road to 5G is Paved with Malware

June 14, 2019 | Adeline Zhang

There is no doubt that 5G will revolutionize how we use online services. Mobile high-speed internet access in excess of 5Gbs will facilitate revolutionary technologies to take advantage of the new bandwidth. Feature rich apps for entertainment, productivity, social media, and health & fitness are preparing to offer functionality only possible with high-speed mobile access. […]

Issues Related to the Application of Machine Learning in Security Threat Scenarios

June 4, 2019 | Adeline Zhang

At RSA 2019, as indicated by Bugra Karabey, the senior risk manager from Microsoft, artificial intelligence (AI) and machine learning (ML) technologies have found a ubiquitous application in the cybersecurity field. Currently, ML is the most popular AI technology which is extensively used. Meanwhile, people begin to think about drawbacks and even security risks of […]

Threat Model ATT&CK

June 3, 2019 | Adeline Zhang

1.    Introduction AI/ML is a hot topic in RSA Conference 2019. Current artificial intelligence (AI) can be roughly divided into perceptual intelligence (capabilities of perceiving images, audio, and video) and cognitive intelligence (knowledge-based reasoning and causal analysis). Most algorithms in use nowadays are perceptual.

DDoS Attacks and Mitigation

May 29, 2019 | Adeline Zhang

Nowadays, the advancement of information technology has brought tremendous convenience to people. Whether it is social networking or ecommerce, the Internet has become an integral and essential part of our lives. As Internet brought new opportunities, it also created new threats. DDoS is one of the most destructive form of threats. In the past decade, […]