当前位置:网站首页>DDoS threat situation gets worse
DDoS threat situation gets worse
2022-06-30 02:06:00 【zy18165754120】
These amazing figures come from Prolexic Latest quarter The global DDoS Attack report .“ Is likely to ,” According to the report ,“ This will be considered a distributed denial of service (DDoS) The milestone quarter of the attack . Attacks have never been so powerful .” in fact , The increase is not the total number of attacks ( It is higher than the high point of the previous quarter , But there was no significant increase ), But the intensity of the attack has changed .
“ This is a classic transformation ,”Prolexic President Stuart Scholly say .“ Almost everyone is concerned about bandwidth and gigabits per second , But the biggest damage and challenge is packet rate . These packet rates are higher than the threshold for all routers and line cards except the most expensive ones , We've seen the network crash .” Side effects are collateral damage .“ because DDoS The target of the attacker is ISP And operator router infrastructure , They are overwhelmed by the huge flood of packets per second , So when the router fails , Your site may crash due to collateral damage . What's worse is , Your service provider may set your traffic as a black hole or an empty route to save your network ,”Prolexic Warning .
One thing that seems clear is , There are quite a few resources behind an attack of this size , This makes them look likely not to be “ ordinary ” Hacking protests . Yes Wordpress Of Latest attack The website may be indicative . Although the purpose behind the attack is not clear , But attack a lot of servers instead of at home PC The attempt may be for such a large scale DDoS Attacks build new 、 Attempts at a more powerful botnet .“ These attacks are beyond the scope of ordinary script kids , Such as collecting hosts 、 Coordinate 、 The schedule and the details of the selected targets indicate that . These indicators point to motives beyond ideology , The military accuracy of the attack implies the use of global sophisticated criminals who employ digital mercenaries .” It adds ,“ Next quarter , We can expect that the biggest attacks will continue to come from these infected Web The server .”
What is not stated but clearly implied is the cooperation between nation-state resources and criminal mercenaries —— And the emergence of high power as a network weapon DDoS The potential of .“ It is also worth noting that , Iran was the top source of malicious traffic this quarter 10 One of the countries . This is very interesting. , Because Iran implements a strict browsing policy similar to that of Cuba and North Korea .” Again , This means that if there is no official approval or instruction , It can't be done . It is worth noting that ,Izz ad-Din al-Qassam Cyber Fighters Claiming a sustained large-scale attack on the Bank of the United States, claiming that the organization through Hamas With Iran .
Prolexic The situation is not expected to improve .“ It's just 9 month ,Prolexic Find out 50 Gbps Is an easy to implement attack feature . We now see more than 10% More attacks than 60 Gbps The threshold of . As early as 2013 Second quarter , We have already alleviated more than 160 Gbps The attack of . If we see a breakthrough attack by the end of this quarter 200 Gbps mark ,PLXsert(Prolexic Safety engineering and response team ) Not surprised .”
边栏推荐
- 33Mysql
- JS reverse case -rus5 logic learning
- Cookie encryption 9
- Embedded test template
- Varnish foundation overview 10
- Repair method for win10 subsystem WSL if the passwords of root and other users are forgotten
- Is online stock trading safe? Do you need to open an account for stock trading?
- 207. curriculum - graph theory, depth traversal
- [MySQL 04] sauvegarde et restauration de la base de données MySQL sous Linux en utilisant MySQL Workbench 8.0 ce
- Widget uses setimageviewbitmap method to set bug analysis
猜你喜欢
![[naturallanguageprocessing] [multimodality] ofa: unified architecture, tasks and modes through a simple sequence to sequence learning framework](/img/c9/7be54c428212d7226cbbbb4800fcdb.png)
[naturallanguageprocessing] [multimodality] ofa: unified architecture, tasks and modes through a simple sequence to sequence learning framework

Jenkins continuous integration environment build 8 (configure mailbox server to send build results)

【MySQL 05】SUSE 12 SP5 安装MySQL后第一次修改mysql密码

UE5的蓝图节点拷贝到UE4后连线和属性值全部丢失了

【银河麒麟V10】【桌面】火狐浏览器设置主页不生效

8 — router

DTW learning (dynamic time warping) -- Thought and code implementation

What problems can cloud storage architecture solve for Devops?

Cookie encryption 13

一种跳板机的实现思路
随机推荐
007_ checkbox
If mybaits cannot query the data, it can query how to change it in the database
The national industrial information security development research center issued the report on industrial information security situation in 2021
Pytoch modifies the hook source code to obtain per layer output parameters (with layer name)
What should I do when I feel confused after graduation from university?
210. Schedule II - depth traversal
C language number prime
[mrctf2020]ezpop-1 | PHP serialization
Widget uses setimageviewbitmap method to set bug analysis
Implementation of a simple camera based on pyqt5
After the blueprint node of ue5 is copied to UE4, all connections and attribute values are lost
一种跳板机的实现思路
【自然语言处理】【多模态】OFA:通过简单的sequence-to-sequence学习框架统一架构、任务和模态
Is the processor the main factor in buying a mobile phone?
Repair method for win10 subsystem WSL if the passwords of root and other users are forgotten
一次 Keepalived 高可用的事故,让我重学了一遍它!
Spark 离线开发框架设计与实现
Conversion between opencv and image (valid for pro test)
Blue Bridge Cup stm32g431 - three lines of code for keys (long press, short press, click, double click)
012_ switch