当前位置:网站首页>DDoS attacks - are we really at war?
DDoS attacks - are we really at war?
2022-06-30 02:06:00 【zy18165754120】
Arbor Networks The chief safety scientist of Craig Labovitz Use the company's ATLAS Internet mapping technology analyzes DDoS attack , According to him , The biggest problem these websites face is flood attack .
He said , stay 2010 During the year ,Arbor Networks It was observed that 50+ Gbps Many in the range DDoS attack .
“ These large-scale flooding attacks usually exceed the total inbound bandwidth capacity of the backbone links of the data center and operators ( Usually it is OC192 / 10 Gbps)”, He was in His security blog says .
and , He went on to add , Despite thousands of tweets 、 News articles and endless hype , But most of the attacks last week were relatively small and simple .
He explained that the :“ In short , In addition to the strict censorship of the media , These attacks are not noticeable ”.
for example , stay Cablegate The third day after the initial release of the document (12 month 1 Japan ) , His company analyzed a number of WikiLeaks Hosting site DDoS Activities , He said ,DDoS Traffic never exceeds 3-4 Gbps.
He claimed that , Mitigating attacks on this scale is important for 1/2 layer ISP And large content / Managed service providers are fairly routine , And more disturbing than the imminent threat to critical infrastructure ——“ Or as an Internet engineer explained ‘ Easy to stop ’ ”.
Labovitz Express , In an incident last week , about 20% Retaliatory attack DDoS HTTP The request comes from a new LOIC variant , Predictably enough ,LOIC-2.
“LOIC A new version of the —— Yes LOIC Complete rewrite of —— Support extra ‘ hive ’ Remote control command channel , Include RSS、Twitter and Facebook”, He said .
“ what's more ,LOIC-2 Support two new ‘ Slow down ’ Attack methods ( That is, the client intentionally extends HTTP Transaction time to increase the burden on the victim server DDoS Strategy )”, He added .
and ,Arbor Networks The chief scientist went on to say , Although the last round of attacks led to a brief interruption , But most operators and hosting service providers can quickly filter attack traffic .
Besides , He said , These attacks are mainly aimed at web pages or mild reading blogs , Rather than a more critical back-end infrastructure for commercial transactions .
“ By the end of this week , Anonymous followers mostly abandoned their attack plans because they were ineffective ,” He said .
“ therefore , Final , I suggest going around WikiLeaks supporters and opponents DDoS An attack is far from a cyber war ,” He added .
“ Although its title is far from sexy , But network sabotage may be a more appropriate description . Similarly , The foreign policy column will hactivist DDoS The number is equivalent to the sit in of young people all over the world .”
边栏推荐
- 【MySQL 06】linux + Docker容器环境中备份和还原MySQL数据库
- [binary tree] maximum binary tree II
- What is idempotency? Detailed explanation of four interface idempotence schemes!
- The birth of the cheapswap protocol
- Jenkins continuous integration environment build 8 (configure mailbox server to send build results)
- Cookie encryption 13
- [MySQL 04] use MySQL workbench 8.0 CE to back up and restore MySQL databases in Linux
- 工具与生活服务
- Local page floating animation is realized with the help of scroll wheel
- MySQL monitoring 5
猜你喜欢
Matlab 2012a 绘制带箭头的线段
C语言 数素数
Learning C language from scratch day 026
Jenkins continuous integration environment construction VII (Jenkins parametric construction)
004_ icon
Widget uses setimageviewbitmap method to set bug analysis
【自然语言处理】【多模态】OFA:通过简单的sequence-to-sequence学习框架统一架构、任务和模态
012_ switch
C language irony
Comprendre le principe AQS (organigramme et schéma de file d'attente synchrone)
随机推荐
Cookie encryption 13
Jenkins continuous integration environment construction VII (Jenkins parametric construction)
DTW learning (dynamic time warping) -- Thought and code implementation
Varnish foundation overview 1
Varnish foundation overview 2
Tencent released the first Office Photo 23 years ago. It's so chronological
[protection mode] segment descriptor
C language score ranking
CheapSwap 协议的诞生
Spark 离线开发框架设计与实现
Some practical knowledge about PR
Sorting out the usage of transforms in pytoch
假離婚變成真離婚,財產怎麼辦
云存储架构能解决 DevOps 的什么问题?
DMX configuration
What problems can cloud storage architecture solve for Devops?
The first technology podcast month will begin soon
(1)基础学习——图解pin、pad、port、IO、net 的区别
012_ switch
Design and implementation of spark offline development framework