当前位置:网站首页>Trends in DDoS Attacks
Trends in DDoS Attacks
2022-07-06 02:31:00 【zy18165754120】
The first thing to notice is , Although hacker activism made headlines , But according to Neustar That's what I'm saying ,DDoS The main motive behind the attack is not :“ Most attacks still come from other sources , That is, blackmailers 、 Cruel competitors and other for-profit attackers ...... Those who aim at your bottom line —— In the form of ransom notes threatening your website or competitors competing for market share —— Still launching most of the overall attacks .”
One problem is that attack technology is becoming more and more complex , At the same time, it is cheap and easy to use . Medium sized companies are unlikely to have the extensive security defenses of large companies . A successful attack may cost such companies 150,000 dollar , But every day just 67 You can hire botnets as an attack tool for us dollars . Extortion and attacking competitors have economic significance .
Another problem is that medium-sized companies will rely heavily on traditional security defense , Like firewalls and IDS/IPS equipment . but Neustar Pointed out that , Firewall becomes DDoS Part of the attack problem .“ They may soon become bottlenecks , Help attackers slow down or shut down your goals ...... stay DDoS During the attack , Firewalls shut down faster than the servers they protect .”
The attack itself becomes smaller and smaller , But more and more frequent and advanced . Although old-fashioned flood attacks are still popular , But concentrated attacks designed to overwhelm processors rather than just block access are increasing . It is called high packet per second (PPS) attack ,“ When it tries to handle the lightning war of requests , The absolute number of packets may make your CPU collapse .” And it's not just for traditional websites and DNS. Encrypted traffic ( Because by definition , It may be of value to the victim ), And the less defensible part of the Internet infrastructure , E.g. e-mail server 、API、SNMP Wait for the default configuration , even to the extent that VoIP Could be attacked .“ Imagine , Because the Internet connection is crowded , No telephone service ,”Neustar say .“ Or because the customer cannot connect to your API And lose sales .”
Last , Two danger signs for the future . First , Whether the defense can handle IPv6 Traffic ?“ If acceptance is slow ,IPv6 It is certain to achieve stability , Therefore, it is wise to ensure your DDoS Solution ( and DNS) It's ready .” Just because mobile infrastructure is not used much , Doesn't mean it won't .“ you 're right ,”Neustar say ,“ You can launch from most smartphones or tablets DDoS attack . The bottom line : Mobile devices are starting to amplify the threat .”
边栏推荐
- 力扣今日題-729. 我的日程安排錶 I
- Audio and video engineer YUV and RGB detailed explanation
- 剑指 Offer 30. 包含min函数的栈
- MySQL (IV) - transactions
- How to generate rich text online
- 剑指 Offer 29. 顺时针打印矩阵
- Global and Chinese markets of nasal oxygen tubes 2022-2028: Research Report on technology, participants, trends, market size and share
- MySQL winter vacation self-study 2022 11 (6)
- [Digital IC manual tearing code] Verilog asynchronous reset synchronous release | topic | principle | design | simulation
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 9
猜你喜欢
[Wu Enda machine learning] week5 programming assignment EX4 - neural network learning
2022 China eye Expo, Shandong vision prevention and control exhibition, myopia, China myopia correction Exhibition
【无标题】数据库中一条查询SQL执行的过程
零基础自学STM32-复习篇2——使用结构体封装GPIO寄存器
Formatting occurs twice when vs code is saved
零基础自学STM32-野火——GPIO复习篇——使用绝对地址操作GPIO
Shell脚本更新存储过程到数据库
[community personas] exclusive interview with Ma Longwei: the wheel is not easy to use, so make it yourself!
MySQL winter vacation self-study 2022 11 (9)
技术管理进阶——什么是管理者之体力、脑力、心力
随机推荐
零基础自学STM32-复习篇2——使用结构体封装GPIO寄存器
Crawler (9) - scrape framework (1) | scrape asynchronous web crawler framework
ReferenceError: primordials is not defined错误解决
机器学习训练与参数优化的一般过程 (讨论)
Paper notes: graph neural network gat
729. My schedule I / offer II 106 Bipartite graph
MySQL winter vacation self-study 2022 11 (7)
米家、涂鸦、Hilink、智汀等生态哪家强?5大主流智能品牌分析
Reset nodejs of the system
Multiple solutions to one problem, asp Net core application startup initialization n schemes [Part 1]
MySQL learning notes - subquery exercise
The intelligent material transmission system of the 6th National Games of the Blue Bridge Cup
在线怎么生成富文本
剑指 Offer 30. 包含min函数的栈
What should we pay attention to when using the built-in tool to check the health status in gbase 8C database?
Advanced technology management - what is the physical, mental and mental strength of managers
HttpRunnerManager安装(三)-Linux下配置myql数据库&初始化数据
[untitled] a query SQL execution process in the database
High number_ Vector algebra_ Unit vector_ Angle between vector and coordinate axis
Minecraft 1.16.5 biochemical 8 module version 2.0 storybook + more guns