当前位置:网站首页>DDoS attacks - are we really at war?
DDoS attacks - are we really at war?
2022-07-06 02:31:00 【zy18165754120】
Arbor Networks The chief safety scientist of Craig Labovitz Use the company's ATLAS Internet mapping technology analyzes DDoS attack , According to him , The biggest problem these websites face is flood attack .
He said , stay 2010 During the year ,Arbor Networks It was observed that 50+ Gbps Many in the range DDoS attack .
“ These large-scale flooding attacks usually exceed the total inbound bandwidth capacity of the backbone links of the data center and operators ( Usually it is OC192 / 10 Gbps)”, He was in His security blog says .
and , He went on to add , Despite thousands of tweets 、 News articles and endless hype , But most of the attacks last week were relatively small and simple .
He explained that the :“ In short , In addition to the strict censorship of the media , These attacks are not noticeable ”.
for example , stay Cablegate The third day after the initial release of the document (12 month 1 Japan ) , His company analyzed a number of WikiLeaks Hosting site DDoS Activities , He said ,DDoS Traffic never exceeds 3-4 Gbps.
He claimed that , Mitigating attacks on this scale is important for 1/2 layer ISP And large content / Managed service providers are fairly routine , And more disturbing than the imminent threat to critical infrastructure ——“ Or as an Internet engineer explained ‘ Easy to stop ’ ”.
Labovitz Express , In an incident last week , about 20% Retaliatory attack DDoS HTTP The request comes from a new LOIC variant , Predictably enough ,LOIC-2.
“LOIC A new version of the —— Yes LOIC Complete rewrite of —— Support extra ‘ hive ’ Remote control command channel , Include RSS、Twitter and Facebook”, He said .
“ what's more ,LOIC-2 Support two new ‘ Slow down ’ Attack methods ( That is, the client intentionally extends HTTP Transaction time to increase the burden on the victim server DDoS Strategy )”, He added .
and ,Arbor Networks The chief scientist went on to say , Although the last round of attacks led to a brief interruption , But most operators and hosting service providers can quickly filter attack traffic .
Besides , He said , These attacks are mainly aimed at web pages or mild reading blogs , Rather than a more critical back-end infrastructure for commercial transactions .
“ By the end of this week , Anonymous followers mostly abandoned their attack plans because they were ineffective ,” He said .
“ therefore , Final , I suggest going around WikiLeaks supporters and opponents DDoS An attack is far from a cyber war ,” He added .
“ Although its title is far from sexy , But network sabotage may be a more appropriate description . Similarly , The foreign policy column will hactivist DDoS The number is equivalent to the sit in of young people all over the world .”
边栏推荐
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 20
- General process of machine learning training and parameter optimization (discussion)
- Building the prototype of library functions -- refer to the manual of wildfire
- Compact lidar global and Chinese markets 2022-2028: technology, participants, trends, market size and share Research Report
- 构建库函数的雏形——参照野火的手册
- Multiple solutions to one problem, asp Net core application startup initialization n schemes [Part 1]
- 2022 eye health exhibition, vision rehabilitation exhibition, optometry equipment exhibition, eye care products exhibition, eye mask Exhibition
- Httprunnermanager installation (III) - configuring myql Database & initialization data under Linux
- Dachang image library
- 米家、涂鸦、Hilink、智汀等生态哪家强?5大主流智能品牌分析
猜你喜欢

High number_ Vector algebra_ Unit vector_ Angle between vector and coordinate axis

Crawler (9) - scrape framework (1) | scrape asynchronous web crawler framework

【无标题】数据库中一条查询SQL执行的过程

Building the prototype of library functions -- refer to the manual of wildfire

The intelligent material transmission system of the 6th National Games of the Blue Bridge Cup

Structural theme model (I) STM package workflow

【社区人物志】专访马龙伟:轮子不好用,那就自己造!

ReferenceError: primordials is not defined错误解决

MySQL lethal serial question 1 -- are you familiar with MySQL transactions?

2022 eye health exhibition, vision rehabilitation exhibition, optometry equipment exhibition, eye care products exhibition, eye mask Exhibition
随机推荐
Compact lidar global and Chinese markets 2022-2028: technology, participants, trends, market size and share Research Report
inherited constructors
RDD creation method of spark
Dachang image library
Number conclusion LC skimming review - 1
怎么检查GBase 8c数据库中的锁信息?
Global and Chinese market of commercial cheese crushers 2022-2028: Research Report on technology, participants, trends, market size and share
好用的 JS 脚本
[robot library] awesome robots Libraries
VIM usage guide
Sword finger offer 30 Stack containing min function
构建库函数的雏形——参照野火的手册
How to check the lock information in gbase 8C database?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22
Adapter-a technology of adaptive pre training continuous learning
技术管理进阶——什么是管理者之体力、脑力、心力
Is there a case where sqlcdc monitors multiple tables and then associates them to sink to another table? All operations in MySQL
[untitled] a query SQL execution process in the database
MySQL winter vacation self-study 2022 11 (6)