当前位置:网站首页>Trends in DDoS Attacks
Trends in DDoS Attacks
2022-07-06 02:31:00 【zy18165754120】
The first thing to notice is , Although hacker activism made headlines , But according to Neustar That's what I'm saying ,DDoS The main motive behind the attack is not :“ Most attacks still come from other sources , That is, blackmailers 、 Cruel competitors and other for-profit attackers ...... Those who aim at your bottom line —— In the form of ransom notes threatening your website or competitors competing for market share —— Still launching most of the overall attacks .”
One problem is that attack technology is becoming more and more complex , At the same time, it is cheap and easy to use . Medium sized companies are unlikely to have the extensive security defenses of large companies . A successful attack may cost such companies 150,000 dollar , But every day just 67 You can hire botnets as an attack tool for us dollars . Extortion and attacking competitors have economic significance .
Another problem is that medium-sized companies will rely heavily on traditional security defense , Like firewalls and IDS/IPS equipment . but Neustar Pointed out that , Firewall becomes DDoS Part of the attack problem .“ They may soon become bottlenecks , Help attackers slow down or shut down your goals ...... stay DDoS During the attack , Firewalls shut down faster than the servers they protect .”
The attack itself becomes smaller and smaller , But more and more frequent and advanced . Although old-fashioned flood attacks are still popular , But concentrated attacks designed to overwhelm processors rather than just block access are increasing . It is called high packet per second (PPS) attack ,“ When it tries to handle the lightning war of requests , The absolute number of packets may make your CPU collapse .” And it's not just for traditional websites and DNS. Encrypted traffic ( Because by definition , It may be of value to the victim ), And the less defensible part of the Internet infrastructure , E.g. e-mail server 、API、SNMP Wait for the default configuration , even to the extent that VoIP Could be attacked .“ Imagine , Because the Internet connection is crowded , No telephone service ,”Neustar say .“ Or because the customer cannot connect to your API And lose sales .”
Last , Two danger signs for the future . First , Whether the defense can handle IPv6 Traffic ?“ If acceptance is slow ,IPv6 It is certain to achieve stability , Therefore, it is wise to ensure your DDoS Solution ( and DNS) It's ready .” Just because mobile infrastructure is not used much , Doesn't mean it won't .“ you 're right ,”Neustar say ,“ You can launch from most smartphones or tablets DDoS attack . The bottom line : Mobile devices are starting to amplify the threat .”
边栏推荐
- sql表名作为参数传递
- 模板_快速排序_双指针
- Easy to use js script
- Y a - t - il des cas où sqlcdc surveille plusieurs tables et les associe à une autre? Tout fonctionne dans MySQL
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
- 构建库函数的雏形——参照野火的手册
- vs code保存时 出现两次格式化
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 23
- MySQL winter vacation self-study 2022 11 (5)
- Pat grade a 1033 to fill or not to fill
猜你喜欢

Minecraft 1.18.1, 1.18.2 module development 22 Sniper rifle

High number_ Vector algebra_ Unit vector_ Angle between vector and coordinate axis

HttpRunnerManager安装(三)-Linux下配置myql数据库&初始化数据

Exness: Mercedes Benz's profits exceed expectations, and it is predicted that there will be a supply chain shortage in 2022

剑指 Offer 29. 顺时针打印矩阵

Ue4- how to make a simple TPS role (II) - realize the basic movement of the role

构建库函数的雏形——参照野火的手册

Use image components to slide through photo albums and mobile phone photo album pages

Crawler (9) - scrape framework (1) | scrape asynchronous web crawler framework

2022.02.13
随机推荐
SSM assembly
Keyword static
Blue Bridge Cup group B provincial preliminaries first question 2013 (Gauss Diary)
2022.02.13
模板_求排列逆序对_基于归并排序
大厂镜像库
I changed the driver to 5.1.35, but it is still the same error. I can succeed even now, but I will report this every time I do an SQL operation
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 21
机器学习训练与参数优化的一般过程 (讨论)
Reset nodejs of the system
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12
VIM usage guide
PAT甲级 1033 To Fill or Not to Fill
ftp上传文件时出现 550 Permission denied,不是用户权限问题
729. 我的日程安排表 I / 剑指 Offer II 106. 二分图
Have a look at this generation
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
【机器人库】 awesome-robotics-libraries
【coppeliasim】高效传送带
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 11