当前位置:网站首页>DDoS threat situation gets worse
DDoS threat situation gets worse
2022-06-30 02:07:00 【zy18165754120】
These amazing figures come from Prolexic Latest quarter The global DDoS Attack report .“ Is likely to ,” According to the report ,“ This will be considered a distributed denial of service (DDoS) The milestone quarter of the attack . Attacks have never been so powerful .” in fact , The increase is not the total number of attacks ( It is higher than the high point of the previous quarter , But there was no significant increase ), But the intensity of the attack has changed .
“ This is a classic transformation ,”Prolexic President Stuart Scholly say .“ Almost everyone is concerned about bandwidth and gigabits per second , But the biggest damage and challenge is packet rate . These packet rates are higher than the threshold for all routers and line cards except the most expensive ones , We've seen the network crash .” Side effects are collateral damage .“ because DDoS The target of the attacker is ISP And operator router infrastructure , They are overwhelmed by the huge flood of packets per second , So when the router fails , Your site may crash due to collateral damage . What's worse is , Your service provider may set your traffic as a black hole or an empty route to save your network ,”Prolexic Warning .
One thing that seems clear is , There are quite a few resources behind an attack of this size , This makes them look likely not to be “ ordinary ” Hacking protests . Yes Wordpress Of Latest attack The website may be indicative . Although the purpose behind the attack is not clear , But attack a lot of servers instead of at home PC The attempt may be for such a large scale DDoS Attacks build new 、 Attempts at a more powerful botnet .“ These attacks are beyond the scope of ordinary script kids , Such as collecting hosts 、 Coordinate 、 The schedule and the details of the selected targets indicate that . These indicators point to motives beyond ideology , The military accuracy of the attack implies the use of global sophisticated criminals who employ digital mercenaries .” It adds ,“ Next quarter , We can expect that the biggest attacks will continue to come from these infected Web The server .”
What is not stated but clearly implied is the cooperation between nation-state resources and criminal mercenaries —— And the emergence of high power as a network weapon DDoS The potential of .“ It is also worth noting that , Iran was the top source of malicious traffic this quarter 10 One of the countries . This is very interesting. , Because Iran implements a strict browsing policy similar to that of Cuba and North Korea .” Again , This means that if there is no official approval or instruction , It can't be done . It is worth noting that ,Izz ad-Din al-Qassam Cyber Fighters Claiming a sustained large-scale attack on the Bank of the United States, claiming that the organization through Hamas With Iran .
Prolexic The situation is not expected to improve .“ It's just 9 month ,Prolexic Find out 50 Gbps Is an easy to implement attack feature . We now see more than 10% More attacks than 60 Gbps The threshold of . As early as 2013 Second quarter , We have already alleviated more than 160 Gbps The attack of . If we see a breakthrough attack by the end of this quarter 200 Gbps mark ,PLXsert(Prolexic Safety engineering and response team ) Not surprised .”
边栏推荐
- The (3n+1) conjecture that C language kills people without paying for their lives
- Simple implementation of unity object pool
- A keepalived high availability accident made me learn it again!
- 003_ color
- 记录生产的一次OOM异常
- DTW学习(dynamic time warping)——思想、代码实现
- Write this number in C
- Est - ce que la bourse en ligne est sécurisée? Dois - je ouvrir un compte pour la spéculation boursière?
- Unity2d-- add keys to animation and bind events
- 9 — 正则校验集合
猜你喜欢

Circular right shift of array elements in C language

001_ layout

一次 Keepalived 高可用的事故,让我重学了一遍它!

C language score ranking

8 — router

Share the source code of the website of graduation student record

【银河麒麟V10】【桌面】火狐浏览器设置主页不生效

当大学毕业感到迷茫怎么办?

AI落地制造业:智能机器人应具备这4种能力

Illustration Google V8 19: asynchronous programming (II): how does V8 implement async/await?
随机推荐
ROS bridge notes (01) - APT installation, source code compilation and installation, installation dependency, and operation display
Learning C language from scratch day 026
018_ rate
The national industrial information security development research center issued the report on industrial information security situation in 2021
C language number prime
Conjecture of prime pairs in C language
【自然语言处理】【多模态】OFA:通过简单的sequence-to-sequence学习框架统一架构、任务和模态
013_ slider
AI落地制造业:智能机器人应具备这4种能力
(4) Blender source code analysis flash window display process
Who can use redis expired monitoring to close orders and get out of here!
Simple implementation of unity object pool
001_ layout
The birth of the cheapswap protocol
Oppo mobile phone search
[Galaxy Kirin V10] [desktop] Firefox browser settings home page does not take effect
Circular right shift of array elements in C language
【MySQL 06】linux + Docker容器环境中备份和还原MySQL数据库
[pytorch actual combat] generate confrontation network Gan: generate cartoon character avatars
MySQL monitoring 6