当前位置:网站首页>DDoS threat situation gets worse
DDoS threat situation gets worse
2022-06-30 02:07:00 【zy18165754120】
These amazing figures come from Prolexic Latest quarter The global DDoS Attack report .“ Is likely to ,” According to the report ,“ This will be considered a distributed denial of service (DDoS) The milestone quarter of the attack . Attacks have never been so powerful .” in fact , The increase is not the total number of attacks ( It is higher than the high point of the previous quarter , But there was no significant increase ), But the intensity of the attack has changed .
“ This is a classic transformation ,”Prolexic President Stuart Scholly say .“ Almost everyone is concerned about bandwidth and gigabits per second , But the biggest damage and challenge is packet rate . These packet rates are higher than the threshold for all routers and line cards except the most expensive ones , We've seen the network crash .” Side effects are collateral damage .“ because DDoS The target of the attacker is ISP And operator router infrastructure , They are overwhelmed by the huge flood of packets per second , So when the router fails , Your site may crash due to collateral damage . What's worse is , Your service provider may set your traffic as a black hole or an empty route to save your network ,”Prolexic Warning .
One thing that seems clear is , There are quite a few resources behind an attack of this size , This makes them look likely not to be “ ordinary ” Hacking protests . Yes Wordpress Of Latest attack The website may be indicative . Although the purpose behind the attack is not clear , But attack a lot of servers instead of at home PC The attempt may be for such a large scale DDoS Attacks build new 、 Attempts at a more powerful botnet .“ These attacks are beyond the scope of ordinary script kids , Such as collecting hosts 、 Coordinate 、 The schedule and the details of the selected targets indicate that . These indicators point to motives beyond ideology , The military accuracy of the attack implies the use of global sophisticated criminals who employ digital mercenaries .” It adds ,“ Next quarter , We can expect that the biggest attacks will continue to come from these infected Web The server .”
What is not stated but clearly implied is the cooperation between nation-state resources and criminal mercenaries —— And the emergence of high power as a network weapon DDoS The potential of .“ It is also worth noting that , Iran was the top source of malicious traffic this quarter 10 One of the countries . This is very interesting. , Because Iran implements a strict browsing policy similar to that of Cuba and North Korea .” Again , This means that if there is no official approval or instruction , It can't be done . It is worth noting that ,Izz ad-Din al-Qassam Cyber Fighters Claiming a sustained large-scale attack on the Bank of the United States, claiming that the organization through Hamas With Iran .
Prolexic The situation is not expected to improve .“ It's just 9 month ,Prolexic Find out 50 Gbps Is an easy to implement attack feature . We now see more than 10% More attacks than 60 Gbps The threshold of . As early as 2013 Second quarter , We have already alleviated more than 160 Gbps The attack of . If we see a breakthrough attack by the end of this quarter 200 Gbps mark ,PLXsert(Prolexic Safety engineering and response team ) Not surprised .”
边栏推荐
- Scala basics [introduction and installation]
- 002_ container
- Spark 离线开发框架设计与实现
- Varnish foundation overview 2
- DMX的配置
- 【MySQL 05】SUSE 12 SP5 安装MySQL后第一次修改mysql密码
- MySQL monitoring 3
- Realization of a springboard machine
- Thinking carefully and fearfully: a software can be transmitted online to monitor whether employees want to "run away"
- widget使用setImageViewBitmap方法设置bug分析
猜你喜欢
Using face_ Recognition library reports an error reason: cudnn_ STATUS_ NOT_ SUPPORTED
[pytorch actual combat] generate confrontation network Gan: generate cartoon character avatars
006_ radio
The (3n+1) conjecture that C language kills people without paying for their lives
DTW learning (dynamic time warping) -- Thought and code implementation
What should I do when I feel confused after graduation from university?
8 — router
当大学毕业感到迷茫怎么办?
云存储架构能解决 DevOps 的什么问题?
8 — router
随机推荐
[MySQL 05] SUSE 12 SP5 modifies the MySQL password for the first time after installing MySQL
Thinking carefully and fearfully: a software can be transmitted online to monitor whether employees want to "run away"
[binary tree] maximum binary tree II
26. common interview questions of algorithm
AI落地制造业:智能机器人应具备这4种能力
网上炒股安全么?炒股需要开户吗?
Geotools wkt coordinate system conversion
[MySQL 04] use MySQL workbench 8.0 CE to back up and restore MySQL databases in Linux
Pytoch modifies the hook source code to obtain per layer output parameters (with layer name)
CTF introductory learning (WEB direction)
Circular right shift of array elements in C language
9 - regular check set
C language I want to pass
Que se passe - t - il si un faux divorce devient un vrai divorce?
MySQL monitoring 1
Varnish foundation overview 6
004_ icon
Share the source code of the website of graduation student record
Varnish foundation overview 7
Scala基础【入门及安装】