当前位置:网站首页>DDoS threat situation gets worse
DDoS threat situation gets worse
2022-06-30 02:06:00 【zy18165754120】
These amazing figures come from Prolexic Latest quarter The global DDoS Attack report .“ Is likely to ,” According to the report ,“ This will be considered a distributed denial of service (DDoS) The milestone quarter of the attack . Attacks have never been so powerful .” in fact , The increase is not the total number of attacks ( It is higher than the high point of the previous quarter , But there was no significant increase ), But the intensity of the attack has changed .
“ This is a classic transformation ,”Prolexic President Stuart Scholly say .“ Almost everyone is concerned about bandwidth and gigabits per second , But the biggest damage and challenge is packet rate . These packet rates are higher than the threshold for all routers and line cards except the most expensive ones , We've seen the network crash .” Side effects are collateral damage .“ because DDoS The target of the attacker is ISP And operator router infrastructure , They are overwhelmed by the huge flood of packets per second , So when the router fails , Your site may crash due to collateral damage . What's worse is , Your service provider may set your traffic as a black hole or an empty route to save your network ,”Prolexic Warning .
One thing that seems clear is , There are quite a few resources behind an attack of this size , This makes them look likely not to be “ ordinary ” Hacking protests . Yes Wordpress Of Latest attack The website may be indicative . Although the purpose behind the attack is not clear , But attack a lot of servers instead of at home PC The attempt may be for such a large scale DDoS Attacks build new 、 Attempts at a more powerful botnet .“ These attacks are beyond the scope of ordinary script kids , Such as collecting hosts 、 Coordinate 、 The schedule and the details of the selected targets indicate that . These indicators point to motives beyond ideology , The military accuracy of the attack implies the use of global sophisticated criminals who employ digital mercenaries .” It adds ,“ Next quarter , We can expect that the biggest attacks will continue to come from these infected Web The server .”
What is not stated but clearly implied is the cooperation between nation-state resources and criminal mercenaries —— And the emergence of high power as a network weapon DDoS The potential of .“ It is also worth noting that , Iran was the top source of malicious traffic this quarter 10 One of the countries . This is very interesting. , Because Iran implements a strict browsing policy similar to that of Cuba and North Korea .” Again , This means that if there is no official approval or instruction , It can't be done . It is worth noting that ,Izz ad-Din al-Qassam Cyber Fighters Claiming a sustained large-scale attack on the Bank of the United States, claiming that the organization through Hamas With Iran .
Prolexic The situation is not expected to improve .“ It's just 9 month ,Prolexic Find out 50 Gbps Is an easy to implement attack feature . We now see more than 10% More attacks than 60 Gbps The threshold of . As early as 2013 Second quarter , We have already alleviated more than 160 Gbps The attack of . If we see a breakthrough attack by the end of this quarter 200 Gbps mark ,PLXsert(Prolexic Safety engineering and response team ) Not surprised .”
边栏推荐
- Fake divorce turns into real divorce. What about property
- (1)基础学习——图解pin、pad、port、IO、net 的区别
- What is idempotency? Detailed explanation of four interface idempotence schemes!
- Restore a 35k-55k Tencent Android Senior Engineer Interview
- MySQL monitoring 1
- 【MySQL 04】使用MySQL Workbench 8.0 CE 备份及恢复Linux中的MySQL数据库
- Geotools wkt coordinate system conversion
- Yyds dry inventory consistent and smooth zoom type and spacing
- [MySQL 04] sauvegarde et restauration de la base de données MySQL sous Linux en utilisant MySQL Workbench 8.0 ce
- Leetcode 46 Full arrangement (February 15, 2022)
猜你喜欢

The first technology podcast month will begin soon

想转行,但不知道自己要做什么工作比较好?

AI落地制造业:智能机器人应具备这4种能力

图解 Google V8 # 19 :异步编程(二):V8 是如何实现 async/await 的?

Thinking carefully and fearfully: a software can be transmitted online to monitor whether employees want to "run away"

8 — router

Using face_ Recognition library reports an error reason: cudnn_ STATUS_ NOT_ SUPPORTED

Embedded test template

Write this number in C

【MySQL 05】SUSE 12 SP5 安装MySQL后第一次修改mysql密码
随机推荐
The national industrial information security development research center issued the report on industrial information security situation in 2021
DTW学习(dynamic time warping)——思想、代码实现
001_ layout
Learning C language from scratch day 026
The (3n+1) conjecture that C language kills people without paying for their lives
Varnish foundation overview 4
CheapSwap 协议的诞生
003_ color
DMX的配置
Conversion between opencv and image (valid for pro test)
Copy entire directory to output folder maintain folder structure- Copy entire directory to output folder maintaining the folder structure?
7 — filter
假离婚变成真离婚,财产怎么办
Embedded test template
Matlab 2012a drawing line segment with arrow
MySQL monitoring 3
Record an oom exception in production
谁再用Redis过期监听实现关闭订单,立马滚蛋!
C language I want to pass
【银河麒麟V10】【桌面】火狐浏览器设置主页不生效