DDoS attacks

DDoS Attacks and Mitigation

maio 29, 2019

Nowadays, the advancement of information technology has brought tremendous convenience to people. Whether it is social networking or ecommerce, the Internet has become an integral and essential part of our lives. As Internet brought new opportunities, it also created new threats. DDoS is one of the most destructive form of threats. In the past decade, DDoS has been weaponized by various organizations and individuals used for ransomware, revenge, even cyber warfare. (mais…)

Anatomy of an attack: network bandwidth exhaustion

janeiro 5, 2016

Track:  Technical

Author: Vann Abernethy, Field CTO, NSFOCUS

notebook-1071777_1920DDoS attacks come in three basic flavors:  network-layer, application-layer and a hybrid of the two.  This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available network bandwidth or the overwhelming of back-end processing power (which can be directed either at the server system itself or the applications residing on them).  The most efficient approach to take down a target will depend on the target itself.  This is why it is important for every company to consider all of the assets that could become targets when designing anti-DDoS protection.  (mais…)

DDoS attacks – more than just disruption?

dezembro 21, 2015

Track:  General Security

Author: Vann Abernethy, Field CTO, NSFOCUS

DDoS attacks

Distributed Denial-of-Service (DDoS) attacks have been around for decades and have been increasing in popularity due to the relative ease in carrying one out.  Traditionally, the purpose of these attacks has been to make a site or service unavailable to its intended users for some duration via either flood-type attacks or application-layer attacks (which are smaller, but just as effective) that overwhelm the target’s network or systems. (mais…)

Modern DDoS attacks: When Moore’s law meets Darwin’s Theory of Evolution

dezembro 4, 2015

Track:  General Security

Author: Dave Martin, Director of Product Marketing, NSFOCUS

DDoS attacks

What would happen if you combined Moore’s law with Darwin’s Theory of Evolution and applied them to DDoS attacks?  Unfortunately, modern DDoS attacks seem to embody this idea perfectly as both the frequency and complexity of these attacks have become truly staggering in just a short amount of time.

(mais…)

Search

Inscreva-se no Blog da NSFOCUS