当前位置:网站首页>DDoS attacks - are we really at war?
DDoS attacks - are we really at war?
2022-06-30 02:06:00 【zy18165754120】
Arbor Networks The chief safety scientist of Craig Labovitz Use the company's ATLAS Internet mapping technology analyzes DDoS attack , According to him , The biggest problem these websites face is flood attack .
He said , stay 2010 During the year ,Arbor Networks It was observed that 50+ Gbps Many in the range DDoS attack .
“ These large-scale flooding attacks usually exceed the total inbound bandwidth capacity of the backbone links of the data center and operators ( Usually it is OC192 / 10 Gbps)”, He was in His security blog says .
and , He went on to add , Despite thousands of tweets 、 News articles and endless hype , But most of the attacks last week were relatively small and simple .
He explained that the :“ In short , In addition to the strict censorship of the media , These attacks are not noticeable ”.
for example , stay Cablegate The third day after the initial release of the document (12 month 1 Japan ) , His company analyzed a number of WikiLeaks Hosting site DDoS Activities , He said ,DDoS Traffic never exceeds 3-4 Gbps.
He claimed that , Mitigating attacks on this scale is important for 1/2 layer ISP And large content / Managed service providers are fairly routine , And more disturbing than the imminent threat to critical infrastructure ——“ Or as an Internet engineer explained ‘ Easy to stop ’ ”.
Labovitz Express , In an incident last week , about 20% Retaliatory attack DDoS HTTP The request comes from a new LOIC variant , Predictably enough ,LOIC-2.
“LOIC A new version of the —— Yes LOIC Complete rewrite of —— Support extra ‘ hive ’ Remote control command channel , Include RSS、Twitter and Facebook”, He said .
“ what's more ,LOIC-2 Support two new ‘ Slow down ’ Attack methods ( That is, the client intentionally extends HTTP Transaction time to increase the burden on the victim server DDoS Strategy )”, He added .
and ,Arbor Networks The chief scientist went on to say , Although the last round of attacks led to a brief interruption , But most operators and hosting service providers can quickly filter attack traffic .
Besides , He said , These attacks are mainly aimed at web pages or mild reading blogs , Rather than a more critical back-end infrastructure for commercial transactions .
“ By the end of this week , Anonymous followers mostly abandoned their attack plans because they were ineffective ,” He said .
“ therefore , Final , I suggest going around WikiLeaks supporters and opponents DDoS An attack is far from a cyber war ,” He added .
“ Although its title is far from sexy , But network sabotage may be a more appropriate description . Similarly , The foreign policy column will hactivist DDoS The number is equivalent to the sit in of young people all over the world .”
边栏推荐
- [mrctf2020]ezpop-1 | PHP serialization
- Implementation of a simple camera based on pyqt5
- Who can use redis expired monitoring to close orders and get out of here!
- 什么是幂等性?四种接口幂等性方案详解!
- Is it safe to open an account in Sinosteel futures?
- Let‘sPlayCurling
- Method of converting songs from DTS to MP3
- (1) Basic learning - figure out the difference between pin, pad, port, IO and net
- 搞透AQS原理(流程圖及同步隊列圖解)
- Varnish foundation overview 1
猜你喜欢

Understand AQS principle (flow chart and synchronous queue diagram)

【MySQL 05】SUSE 12 SP5 安装MySQL后第一次修改mysql密码

Want to change careers, but don't know what you want to do?

003_ color

After the blueprint node of ue5 is copied to UE4, all connections and attribute values are lost
![[graph neural network] summary of graph classification study [3]: evaluation of graph classification methods and future research directions](/img/b1/2afa73a14b2f41b7a65c4c2d261e6a.png)
[graph neural network] summary of graph classification study [3]: evaluation of graph classification methods and future research directions

widget使用setImageViewBitmap方法设置bug分析

007_ checkbox

C language score ranking

What problems can cloud storage architecture solve for Devops?
随机推荐
Varnish foundation overview 7
What should be paid attention to in the design and production of the Urban Planning Museum
Who can use redis expired monitoring to close orders and get out of here!
Blue Bridge Cup stm32g431 - three lines of code for keys (long press, short press, click, double click)
Want to change careers, but don't know what you want to do?
The (3n+1) conjecture that C language kills people without paying for their lives
Knowledge payment cannot escape the essence of "anxiety"
Illustration Google V8 19: asynchronous programming (II): how does V8 implement async/await?
003_ color
[MRCTF2020]Ezpop-1|php序列化
Que se passe - t - il si un faux divorce devient un vrai divorce?
封装一个完整版的uniapp图片和视频上传组件,拿来即用,可进行图片视频切换,可自定义上传按钮样式,删除按钮样式,可单独上传图片或者视频,可限制上传数量
What are the payment and distribution systems?
Tools and life services
A keepalived high availability accident made me learn it again!
013_ slider
Learning C language from scratch day 026
Conversion between opencv and image (valid for pro test)
【自然语言处理】【多模态】OFA:通过简单的sequence-to-sequence学习框架统一架构、任务和模态
网上炒股安全么?炒股需要开户吗?