DDoS

2020 DDoS Attack Landscape Report – 2

May 31, 2021

Key Findings – 2 The Bandwidth of DDoS attacks in 5G Environments Grew Steadily. Small and Medium-sized Attacks Overtook Small Attacks to Become the Mainstream Over the five-year period from 2016 to 2020, the average peak size of DDoS attacks rose to a new level since the latter half of 2018 despite obvious fluctuations. Of […]

FBI Warning: New DDoS Reflection Attacks Are Coming, Are You Ready?

August 7, 2020

According to ZDNet’s reports, FBI released a warning last week that some new network protocols were used by criminals to launch large-scale DDoS attacks. Three protocols and one Web applications were found as DDoS attack vectors, including CoAP, WS-DD, ARMS and Web-based Jenkins.

(more…)

SDN-based Intelligent DDoS Cleaning System

December 16, 2019

Traditional DDoS protection solutions are designed to address flexibility, scheduling, and value addition requirements. However, the advent of the software-defined networking (SDN) technology, especially its combination with network virtualization, provides a new way to deploy security devices. NSFOCUS’s SDN-based intelligent cleaning system discussed here can intelligently detect DDoS attacks and work out an optimal cleaning policy before selecting the most appropriate cleaning resources in real time, thus implementing intelligent traffic cleaning on demand to effectively protect users from DDoS attacks. (more…)

What You Should Know About DDoS Incident Response

August 27, 2019

This document addresses the overall strategy and process for DDoS incident response and provides detailed analysis of and countermeasures against some typical attacks, in a bid to help organizations respond to DDoS attacks more effectively and efficiently. Therefore, we will not dwell upon specific methods of and configurations of specific mitigations against each type of DDoS attack. (more…)

DDoS to Loom Large in the 5G Era

July 9, 2019

Today, 5G is around the corner and, in the foreseeable future, it will definitely bring more convenience to our lives. Higher rates of mobile terminals, more devices connected to the Internet of Things (IoT), more convenient remote services… All these will lead us to a brand new era of the Internet of Everything (IoE). With constant breakthroughs in technological innovation, cybersecurity should also move at the same rate. (more…)

DDoS in the Past Decade

July 1, 2019

1.0   Milestones 1.1   DDoS Size Expansion IP data source: The Zettabyte Era: Trends and Analysis The past decade has witnessed a steady growth in the peak size of DDoS attacks, especially in 2013 when the reflection method was used by attackers on a large scale and the DDoS attack size expanded at an exponential rate. […]

A Retrospective Analysis of 300G DDoS Mitigation Powered by NSFOCUS Cloud DPS

May 21, 2019

The NSFOCUS multi-terabit DDoS protection was designed specifically to help enterprises regain control and build confidence with its vigorous layered protections against sophisticated attacks. With automation as an integral part of the NSFOCUS solution, DDoS attacks are detected and remediated immediately, with no disruption to services. (more…)

Traceback of a DDoS Attack

January 1, 2018

An abnormal increase in the CPU usage of a telecom carrier’s 4G firewall substantially slowed down the access from some iPhone users to the Apple website. We suspected that the carrier was hit by a DDoS attack. With the visualized traceback function of NSFOCUS Big Data Security Analytics (BSA), we made a drill-down analysis of […]

Doing It Better

January 21, 2016

Track:  Technical

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS

arrow-945254_1920

Flying at 40,000 feet above the ground always gives one a sense of clarity.  Looking down on the world from such a height can make a person feel somewhat insignificant.  However, my trip today is very noteworthy.  I will be landing in Las Vegas in a few hours and the next four days will be filled with excitement, entertainment, and education.  I am not going to Vegas for the adult playground activities like many of my fellow passengers.  I am going there to attend the most exciting event of my career; the 2016 Sales Kickoff for a widely-unknown company in the U.S. called NSFOCUS IB. (more…)

Anatomy of an attack: network bandwidth exhaustion

January 5, 2016

Track:  Technical

Author: Vann Abernethy, Field CTO, NSFOCUS

notebook-1071777_1920DDoS attacks come in three basic flavors:  network-layer, application-layer and a hybrid of the two.  This is a somewhat simplistic view but when you look at the strategy for taking someone down via DDoS, the two primary vehicles are either exhaustion of available network bandwidth or the overwhelming of back-end processing power (which can be directed either at the server system itself or the applications residing on them).  The most efficient approach to take down a target will depend on the target itself.  This is why it is important for every company to consider all of the assets that could become targets when designing anti-DDoS protection.  (more…)