当前位置:网站首页>DDoS threat situation gets worse
DDoS threat situation gets worse
2022-06-30 02:07:00 【zy18165754120】
These amazing figures come from Prolexic Latest quarter The global DDoS Attack report .“ Is likely to ,” According to the report ,“ This will be considered a distributed denial of service (DDoS) The milestone quarter of the attack . Attacks have never been so powerful .” in fact , The increase is not the total number of attacks ( It is higher than the high point of the previous quarter , But there was no significant increase ), But the intensity of the attack has changed .
“ This is a classic transformation ,”Prolexic President Stuart Scholly say .“ Almost everyone is concerned about bandwidth and gigabits per second , But the biggest damage and challenge is packet rate . These packet rates are higher than the threshold for all routers and line cards except the most expensive ones , We've seen the network crash .” Side effects are collateral damage .“ because DDoS The target of the attacker is ISP And operator router infrastructure , They are overwhelmed by the huge flood of packets per second , So when the router fails , Your site may crash due to collateral damage . What's worse is , Your service provider may set your traffic as a black hole or an empty route to save your network ,”Prolexic Warning .
One thing that seems clear is , There are quite a few resources behind an attack of this size , This makes them look likely not to be “ ordinary ” Hacking protests . Yes Wordpress Of Latest attack The website may be indicative . Although the purpose behind the attack is not clear , But attack a lot of servers instead of at home PC The attempt may be for such a large scale DDoS Attacks build new 、 Attempts at a more powerful botnet .“ These attacks are beyond the scope of ordinary script kids , Such as collecting hosts 、 Coordinate 、 The schedule and the details of the selected targets indicate that . These indicators point to motives beyond ideology , The military accuracy of the attack implies the use of global sophisticated criminals who employ digital mercenaries .” It adds ,“ Next quarter , We can expect that the biggest attacks will continue to come from these infected Web The server .”
What is not stated but clearly implied is the cooperation between nation-state resources and criminal mercenaries —— And the emergence of high power as a network weapon DDoS The potential of .“ It is also worth noting that , Iran was the top source of malicious traffic this quarter 10 One of the countries . This is very interesting. , Because Iran implements a strict browsing policy similar to that of Cuba and North Korea .” Again , This means that if there is no official approval or instruction , It can't be done . It is worth noting that ,Izz ad-Din al-Qassam Cyber Fighters Claiming a sustained large-scale attack on the Bank of the United States, claiming that the organization through Hamas With Iran .
Prolexic The situation is not expected to improve .“ It's just 9 month ,Prolexic Find out 50 Gbps Is an easy to implement attack feature . We now see more than 10% More attacks than 60 Gbps The threshold of . As early as 2013 Second quarter , We have already alleviated more than 160 Gbps The attack of . If we see a breakthrough attack by the end of this quarter 200 Gbps mark ,PLXsert(Prolexic Safety engineering and response team ) Not surprised .”
边栏推荐
- [mrctf2020]ezpop-1 | PHP serialization
- Thinking carefully and fearfully: a software can be transmitted online to monitor whether employees want to "run away"
- js Array. Five convenient applications of from()
- 004_ icon
- 一种跳板机的实现思路
- 210. Schedule II - depth traversal
- 網上炒股安全麼?炒股需要開戶嗎?
- How to create a CSR (certificate signing request) file?
- 207. curriculum - graph theory, depth traversal
- 33Mysql
猜你喜欢

Jenkins continuous integration environment build 8 (configure mailbox server to send build results)

【银河麒麟V10】【桌面】火狐浏览器设置主页不生效

Restore a 35k-55k Tencent Android Senior Engineer Interview

After the blueprint node of ue5 is copied to UE4, all connections and attribute values are lost

001_ layout

Gesture digital enlightenment learning machine

【MySQL 04】使用MySQL Workbench 8.0 CE 备份及恢复Linux中的MySQL数据库

How to create a CSR (certificate signing request) file?

26.算法常用面试题

CTF introductory learning (WEB direction)
随机推荐
Module import reload method
当大学毕业感到迷茫怎么办?
9 - regular check set
工具与生活服务
Implementation of a simple camera based on pyqt5
003_ color
DDoS attacks - are we really at war?
Yyds dry inventory consistent and smooth zoom type and spacing
假离婚变成真离婚,财产怎么办
【MySQL 04】使用MySQL Workbench 8.0 CE 備份及恢複Linux中的MySQL數據庫
007_ checkbox
MySQL monitoring 3
012_ switch
Radware warns about the next round of DDoS Attacks
26. common interview questions of algorithm
[MySQL 06] backup and restore MySQL database in Linux + docker container environment
DTW learning (dynamic time warping) -- Thought and code implementation
Tools and life services
What to remember about the penalty for deduction of points in Item 1
MySQL monitoring