当前位置:网站首页>Trends in DDoS Attacks
Trends in DDoS Attacks
2022-07-06 02:31:00 【zy18165754120】
The first thing to notice is , Although hacker activism made headlines , But according to Neustar That's what I'm saying ,DDoS The main motive behind the attack is not :“ Most attacks still come from other sources , That is, blackmailers 、 Cruel competitors and other for-profit attackers ...... Those who aim at your bottom line —— In the form of ransom notes threatening your website or competitors competing for market share —— Still launching most of the overall attacks .”
One problem is that attack technology is becoming more and more complex , At the same time, it is cheap and easy to use . Medium sized companies are unlikely to have the extensive security defenses of large companies . A successful attack may cost such companies 150,000 dollar , But every day just 67 You can hire botnets as an attack tool for us dollars . Extortion and attacking competitors have economic significance .
Another problem is that medium-sized companies will rely heavily on traditional security defense , Like firewalls and IDS/IPS equipment . but Neustar Pointed out that , Firewall becomes DDoS Part of the attack problem .“ They may soon become bottlenecks , Help attackers slow down or shut down your goals ...... stay DDoS During the attack , Firewalls shut down faster than the servers they protect .”
The attack itself becomes smaller and smaller , But more and more frequent and advanced . Although old-fashioned flood attacks are still popular , But concentrated attacks designed to overwhelm processors rather than just block access are increasing . It is called high packet per second (PPS) attack ,“ When it tries to handle the lightning war of requests , The absolute number of packets may make your CPU collapse .” And it's not just for traditional websites and DNS. Encrypted traffic ( Because by definition , It may be of value to the victim ), And the less defensible part of the Internet infrastructure , E.g. e-mail server 、API、SNMP Wait for the default configuration , even to the extent that VoIP Could be attacked .“ Imagine , Because the Internet connection is crowded , No telephone service ,”Neustar say .“ Or because the customer cannot connect to your API And lose sales .”
Last , Two danger signs for the future . First , Whether the defense can handle IPv6 Traffic ?“ If acceptance is slow ,IPv6 It is certain to achieve stability , Therefore, it is wise to ensure your DDoS Solution ( and DNS) It's ready .” Just because mobile infrastructure is not used much , Doesn't mean it won't .“ you 're right ,”Neustar say ,“ You can launch from most smartphones or tablets DDoS attack . The bottom line : Mobile devices are starting to amplify the threat .”
边栏推荐
- Method of changing object properties
- 在线怎么生成富文本
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24
- Global and Chinese market of wheelchair climbing machines 2022-2028: Research Report on technology, participants, trends, market size and share
- Global and Chinese markets of screw rotor pumps 2022-2028: Research Report on technology, participants, trends, market size and share
- HDU_ p1237_ Simple calculator_ stack
- Minecraft 1.18.1, 1.18.2 module development 22 Sniper rifle
- Dachang image library
- Li Kou today's question -729 My schedule I
- Global and Chinese markets of general purpose centrifuges 2022-2028: Research Report on technology, participants, trends, market size and share
猜你喜欢
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
How to generate rich text online
Crawler (9) - scrape framework (1) | scrape asynchronous web crawler framework
Initial understanding of pointer variables
Use image components to slide through photo albums and mobile phone photo album pages
零基础自学STM32-复习篇2——使用结构体封装GPIO寄存器
Zero basic self-study STM32 wildfire review of GPIO use absolute address to operate GPIO
Use the list component to realize the drop-down list and address list
Prepare for the autumn face-to-face test questions
2022年版图解网络PDF
随机推荐
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 11
在GBase 8c数据库中使用自带工具检查健康状态时,需要注意什么?
Bigder: I felt good about the 34/100 interview, but I didn't receive the admission
Black high-end responsive website dream weaving template (adaptive mobile terminal)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15
Paper notes: limit multi label learning galaxc (temporarily stored, not finished)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12
[robot library] awesome robots Libraries
2022.02.13
【社区人物志】专访马龙伟:轮子不好用,那就自己造!
模板_求排列逆序对_基于归并排序
There are so many giants, why should we independently develop POS store cashier system?
Template_ Find the reverse pair of permutations_ Sort based on merge
After changing the GCC version, make[1] appears in the compilation: cc: command not found
Use the list component to realize the drop-down list and address list
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 7
What should we pay attention to when using the built-in tool to check the health status in gbase 8C database?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 13
Adapter-a technology of adaptive pre training continuous learning
高数_向量代数_单位向量_向量与坐标轴的夹角