当前位置:网站首页>DDoS attacks - are we really at war?
DDoS attacks - are we really at war?
2022-06-30 02:06:00 【zy18165754120】
Arbor Networks The chief safety scientist of Craig Labovitz Use the company's ATLAS Internet mapping technology analyzes DDoS attack , According to him , The biggest problem these websites face is flood attack .
He said , stay 2010 During the year ,Arbor Networks It was observed that 50+ Gbps Many in the range DDoS attack .
“ These large-scale flooding attacks usually exceed the total inbound bandwidth capacity of the backbone links of the data center and operators ( Usually it is OC192 / 10 Gbps)”, He was in His security blog says .
and , He went on to add , Despite thousands of tweets 、 News articles and endless hype , But most of the attacks last week were relatively small and simple .
He explained that the :“ In short , In addition to the strict censorship of the media , These attacks are not noticeable ”.
for example , stay Cablegate The third day after the initial release of the document (12 month 1 Japan ) , His company analyzed a number of WikiLeaks Hosting site DDoS Activities , He said ,DDoS Traffic never exceeds 3-4 Gbps.
He claimed that , Mitigating attacks on this scale is important for 1/2 layer ISP And large content / Managed service providers are fairly routine , And more disturbing than the imminent threat to critical infrastructure ——“ Or as an Internet engineer explained ‘ Easy to stop ’ ”.
Labovitz Express , In an incident last week , about 20% Retaliatory attack DDoS HTTP The request comes from a new LOIC variant , Predictably enough ,LOIC-2.
“LOIC A new version of the —— Yes LOIC Complete rewrite of —— Support extra ‘ hive ’ Remote control command channel , Include RSS、Twitter and Facebook”, He said .
“ what's more ,LOIC-2 Support two new ‘ Slow down ’ Attack methods ( That is, the client intentionally extends HTTP Transaction time to increase the burden on the victim server DDoS Strategy )”, He added .
and ,Arbor Networks The chief scientist went on to say , Although the last round of attacks led to a brief interruption , But most operators and hosting service providers can quickly filter attack traffic .
Besides , He said , These attacks are mainly aimed at web pages or mild reading blogs , Rather than a more critical back-end infrastructure for commercial transactions .
“ By the end of this week , Anonymous followers mostly abandoned their attack plans because they were ineffective ,” He said .
“ therefore , Final , I suggest going around WikiLeaks supporters and opponents DDoS An attack is far from a cyber war ,” He added .
“ Although its title is far from sexy , But network sabotage may be a more appropriate description . Similarly , The foreign policy column will hactivist DDoS The number is equivalent to the sit in of young people all over the world .”
边栏推荐
- Yyds dry inventory consistent and smooth zoom type and spacing
- C language output integer in another format
- Varnish foundation overview 3
- A summary of the quantification of deep network model
- 018_ rate
- C语言 数素数
- [naturallanguageprocessing] [multimodality] ofa: unified architecture, tasks and modes through a simple sequence to sequence learning framework
- 魔百盒CM201-2-CH-Hi3798MV300-300H-EMMC和NAND_红外蓝牙语音_通刷固件包
- Est - ce que la bourse en ligne est sécurisée? Dois - je ouvrir un compte pour la spéculation boursière?
- 网上炒股安全么?炒股需要开户吗?
猜你喜欢

【自然语言处理】【多模态】OFA:通过简单的sequence-to-sequence学习框架统一架构、任务和模态

The first technology podcast month will begin soon

Widget uses setimageviewbitmap method to set bug analysis

【MySQL 04】使用MySQL Workbench 8.0 CE 備份及恢複Linux中的MySQL數據庫

一种跳板机的实现思路

005_ button

Matlab 2012a drawing line segment with arrow

What should be paid attention to in the design and production of the Urban Planning Museum
![[graph neural network] overview of graph classification learning [2]: graph classification based on graph neural network](/img/5f/b23b64eed7f28ffd92c122b6859e2d.png)
[graph neural network] overview of graph classification learning [2]: graph classification based on graph neural network

Add a second network card (network interface NIC) for the virtual machine in azure portal in 2 minutes
随机推荐
209. minimum length subarray - sliding window
What problems can cloud storage architecture solve for Devops?
当大学毕业感到迷茫怎么办?
Electron FAQ 54 - make your own fireworks based on electron
Geotools wkt coordinate system conversion
What is idempotency? Detailed explanation of four interface idempotence schemes!
Want to change careers, but don't know what you want to do?
[pytorch actual combat] generate confrontation network Gan: generate cartoon character avatars
[MySQL 04] use MySQL workbench 8.0 CE to back up and restore MySQL databases in Linux
(1) Basic learning - figure out the difference between pin, pad, port, IO and net
Circular right shift of array elements in C language
假離婚變成真離婚,財產怎麼辦
[naturallanguageprocessing] [multimodality] ofa: unified architecture, tasks and modes through a simple sequence to sequence learning framework
013_ slider
图解 Google V8 # 19 :异步编程(二):V8 是如何实现 async/await 的?
208. implement trie (prefix tree) - attach detailed notes
What should be paid attention to in the design and production of the Urban Planning Museum
[protection mode] segment descriptor
CTF入门学习(Web方向)
Let‘sPlayCurling