Anatomy of an attack: network bandwidth exhaustion

Track:  Technical Author: Vann Abernethy, Field CTO, NSFOCUS DDoS attacks come in three basic flavors:  network-layer, application-layer and a hybrid of the two.  This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available...

DDoS attacks – more than just disruption?

Track:  General Security Author: Vann Abernethy, Field CTO, NSFOCUS Distributed Denial-of-Service (DDoS) attacks have been around for decades and have been increasing in popularity due to the relative ease in carrying one out.  Traditionally, the purpose of these attacks has been to make a site or service unavailable to its intended...

Modern DDoS attacks: When Moore’s law meets Darwin’s Theory of Evolution

Track:  General Security Author: Dave Martin, Director of Product Marketing, NSFOCUS What would happen if you combined Moore’s law with Darwin’s Theory of Evolution and applied them to DDoS attacks?  Unfortunately, modern DDoS attacks seem to embody this idea perfectly as both the frequency and complexity of these attacks have become...

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Este site está registrado em wpml.org como um site de desenvolvimento. Você pode mudar para uma chave de site de produção para remove this banner.