当前位置:网站首页>DDoS threat situation gets worse
DDoS threat situation gets worse
2022-06-30 02:07:00 【zy18165754120】
These amazing figures come from Prolexic Latest quarter The global DDoS Attack report .“ Is likely to ,” According to the report ,“ This will be considered a distributed denial of service (DDoS) The milestone quarter of the attack . Attacks have never been so powerful .” in fact , The increase is not the total number of attacks ( It is higher than the high point of the previous quarter , But there was no significant increase ), But the intensity of the attack has changed .
“ This is a classic transformation ,”Prolexic President Stuart Scholly say .“ Almost everyone is concerned about bandwidth and gigabits per second , But the biggest damage and challenge is packet rate . These packet rates are higher than the threshold for all routers and line cards except the most expensive ones , We've seen the network crash .” Side effects are collateral damage .“ because DDoS The target of the attacker is ISP And operator router infrastructure , They are overwhelmed by the huge flood of packets per second , So when the router fails , Your site may crash due to collateral damage . What's worse is , Your service provider may set your traffic as a black hole or an empty route to save your network ,”Prolexic Warning .
One thing that seems clear is , There are quite a few resources behind an attack of this size , This makes them look likely not to be “ ordinary ” Hacking protests . Yes Wordpress Of Latest attack The website may be indicative . Although the purpose behind the attack is not clear , But attack a lot of servers instead of at home PC The attempt may be for such a large scale DDoS Attacks build new 、 Attempts at a more powerful botnet .“ These attacks are beyond the scope of ordinary script kids , Such as collecting hosts 、 Coordinate 、 The schedule and the details of the selected targets indicate that . These indicators point to motives beyond ideology , The military accuracy of the attack implies the use of global sophisticated criminals who employ digital mercenaries .” It adds ,“ Next quarter , We can expect that the biggest attacks will continue to come from these infected Web The server .”
What is not stated but clearly implied is the cooperation between nation-state resources and criminal mercenaries —— And the emergence of high power as a network weapon DDoS The potential of .“ It is also worth noting that , Iran was the top source of malicious traffic this quarter 10 One of the countries . This is very interesting. , Because Iran implements a strict browsing policy similar to that of Cuba and North Korea .” Again , This means that if there is no official approval or instruction , It can't be done . It is worth noting that ,Izz ad-Din al-Qassam Cyber Fighters Claiming a sustained large-scale attack on the Bank of the United States, claiming that the organization through Hamas With Iran .
Prolexic The situation is not expected to improve .“ It's just 9 month ,Prolexic Find out 50 Gbps Is an easy to implement attack feature . We now see more than 10% More attacks than 60 Gbps The threshold of . As early as 2013 Second quarter , We have already alleviated more than 160 Gbps The attack of . If we see a breakthrough attack by the end of this quarter 200 Gbps mark ,PLXsert(Prolexic Safety engineering and response team ) Not surprised .”
边栏推荐
猜你喜欢
![[pytorch actual combat] generate confrontation network Gan: generate cartoon character avatars](/img/8f/c0cc1c8d19060a60d92c0d72f8b93d.png)
[pytorch actual combat] generate confrontation network Gan: generate cartoon character avatars

C language I want to pass
![[protection mode] segment descriptor](/img/23/19b12c496da437fbf03829b7b4e3b8.jpg)
[protection mode] segment descriptor

Add a second network card (network interface NIC) for the virtual machine in azure portal in 2 minutes

C language irony

C language output integer in another format

UE5的蓝图节点拷贝到UE4后连线和属性值全部丢失了

如何制作CSR(Certificate Signing Request)文件?

JS reverse case -rus5 logic learning

ROS bridge notes (01) - APT installation, source code compilation and installation, installation dependency, and operation display
随机推荐
The birth of the cheapswap protocol
Is the processor the main factor in buying a mobile phone?
Design and implementation of spark offline development framework
AI landing manufacturing: intelligent robots should have these four abilities
记录生产的一次OOM异常
C language I want to pass
[MySQL 04] sauvegarde et restauration de la base de données MySQL sous Linux en utilisant MySQL Workbench 8.0 ce
如何制作CSR(Certificate Signing Request)文件?
Tencent released the first Office Photo 23 years ago. It's so chronological
[mrctf2020]ezpop-1 | PHP serialization
If mybaits cannot query the data, it can query how to change it in the database
What is idempotency? Detailed explanation of four interface idempotence schemes!
Matlab 2012a drawing line segment with arrow
一次 Keepalived 高可用的事故,让我重学了一遍它!
Configure cross domain requests
What to remember about the penalty for deduction of points in Item 1
The national industrial information security development research center issued the report on industrial information security situation in 2021
Comprendre le principe AQS (organigramme et schéma de file d'attente synchrone)
widget使用setImageViewBitmap方法设置bug分析
Copy entire directory to output folder maintain folder structure- Copy entire directory to output folder maintaining the folder structure?