当前位置:网站首页>Trends in DDoS Attacks
Trends in DDoS Attacks
2022-07-06 02:31:00 【zy18165754120】
The first thing to notice is , Although hacker activism made headlines , But according to Neustar That's what I'm saying ,DDoS The main motive behind the attack is not :“ Most attacks still come from other sources , That is, blackmailers 、 Cruel competitors and other for-profit attackers ...... Those who aim at your bottom line —— In the form of ransom notes threatening your website or competitors competing for market share —— Still launching most of the overall attacks .”
One problem is that attack technology is becoming more and more complex , At the same time, it is cheap and easy to use . Medium sized companies are unlikely to have the extensive security defenses of large companies . A successful attack may cost such companies 150,000 dollar , But every day just 67 You can hire botnets as an attack tool for us dollars . Extortion and attacking competitors have economic significance .
Another problem is that medium-sized companies will rely heavily on traditional security defense , Like firewalls and IDS/IPS equipment . but Neustar Pointed out that , Firewall becomes DDoS Part of the attack problem .“ They may soon become bottlenecks , Help attackers slow down or shut down your goals ...... stay DDoS During the attack , Firewalls shut down faster than the servers they protect .”
The attack itself becomes smaller and smaller , But more and more frequent and advanced . Although old-fashioned flood attacks are still popular , But concentrated attacks designed to overwhelm processors rather than just block access are increasing . It is called high packet per second (PPS) attack ,“ When it tries to handle the lightning war of requests , The absolute number of packets may make your CPU collapse .” And it's not just for traditional websites and DNS. Encrypted traffic ( Because by definition , It may be of value to the victim ), And the less defensible part of the Internet infrastructure , E.g. e-mail server 、API、SNMP Wait for the default configuration , even to the extent that VoIP Could be attacked .“ Imagine , Because the Internet connection is crowded , No telephone service ,”Neustar say .“ Or because the customer cannot connect to your API And lose sales .”
Last , Two danger signs for the future . First , Whether the defense can handle IPv6 Traffic ?“ If acceptance is slow ,IPv6 It is certain to achieve stability , Therefore, it is wise to ensure your DDoS Solution ( and DNS) It's ready .” Just because mobile infrastructure is not used much , Doesn't mean it won't .“ you 're right ,”Neustar say ,“ You can launch from most smartphones or tablets DDoS attack . The bottom line : Mobile devices are starting to amplify the threat .”
边栏推荐
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 18
- Minecraft 1.16.5 生化8 模组 2.0版本 故事书+更多枪械
- 论文笔记: 极限多标签学习 GalaXC (暂存, 还没学完)
- The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
- MySQL (IV) - transactions
- The third level of C language punch in
- Reset nodejs of the system
- 怎么检查GBase 8c数据库中的锁信息?
- 从顶会论文看2022年推荐系统序列建模的趋势
- 一位博士在华为的22年
猜你喜欢
Use the list component to realize the drop-down list and address list
[postgraduate entrance examination English] prepare for 2023, learn list5 words
Sword finger offer 29 Print matrix clockwise
ReferenceError: primordials is not defined错误解决
The third level of C language punch in
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22
【MySQL 15】Could not increase number of max_open_files to more than 10000 (request: 65535)
LeetCode 103. Binary tree zigzag level order transverse - Binary Tree Series Question 5
剑指 Offer 29. 顺时针打印矩阵
The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
随机推荐
Y a - t - il des cas où sqlcdc surveille plusieurs tables et les associe à une autre? Tout fonctionne dans MySQL
2022年版图解网络PDF
RDD creation method of spark
[coppeliasim] 6-DOF path planning
RDD conversion operator of spark
好用的 JS 脚本
550 permission denied occurs when FTP uploads files, which is not a user permission problem
HDU_ p1237_ Simple calculator_ stack
在线怎么生成富文本
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 14
Multiple solutions to one problem, asp Net core application startup initialization n schemes [Part 1]
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15
[Wu Enda machine learning] week5 programming assignment EX4 - neural network learning
Data preparation
米家、涂鸦、Hilink、智汀等生态哪家强?5大主流智能品牌分析
Global and Chinese markets of general purpose centrifuges 2022-2028: Research Report on technology, participants, trends, market size and share
高数_向量代数_单位向量_向量与坐标轴的夹角
Structural theme model (I) STM package workflow
SQL table name is passed as a parameter
Have a look at this generation