Cyber security news for all

More

    Volumetric attacks generate huge amounts of data in denial-of-service attacks

    Targeted denial-of-service attacks on servers, computers or other components in the data network repeatedly paralyze websites and mail servers. It is not yet possible to protect yourself from this. What remains are various ways to withstand such attacks. One method is blackholing.

    Experts warn companies and organizations again in the first quarter of 2020 against the sophisticated DDoS attacks. The number of the attacks has been in the same high level since the last three years. A dangerous trend in the quality and complexity of these attacks. Areas of attack include well-known websites such as Facebook and Instagram, which were unavailable to users for hours last year due to massive DDoS attacks. Effective protection is not yet in sight. And stopping the attacks is also hardly possible. They often last until they no longer have an effect.

    DoS attack

    Block Or Eliminate Malicious Traffic

    If it is a simple DoS attack, this usually occurs from a single or very few IP addresses. These are usually relatively easy to identify and can then be blocked. This is often not sufficient for DDoS and DRDoS attacks due to the immense amount of data. In addition, the traffic in such attacks is so intelligently distributed that it sometimes takes several days to weeks to be identified. One way to withstand such attacks is to identify and eliminate the malicious traffic.

    An exposed host analyzes the incoming requests, for example based on the signatures, sender addresses or protocols. It recognizes the real requests and forwards them to the server for normal processing. If the number of requests increases, there is a risk that the exposed host will reach its limits and additional exposed hosts will be required.

    Decide In Individual Cases

    Which measure is the best choice in the event of an attack depends on the individual case. It should be borne in mind that some methods require a little time in advance. For example when profiling, the time to create the activity profiles must be scheduled. The geographical distribution also only works with appropriate preparation. Traffic washing or scrubbing is now also possible. The bandwidths and resources required for this have been established. If customers have their own infrastructure or firewall, geoblocking can also be implemented very quickly.

    Recent Articles

    Police warn of a scam with fake websites on the Airbnb

    The apartment is centrally located and costs less: what looks like a great offer could be an attempt at fraud. The police in Europe...

    Significant increase in attacks with macOS specific macro malware

    Security researcher Patrick Wardle has observed a significant increase in attacks with macOS specific macro malware. As he explained in his lecture on Wednesday...

    China controls news with offline and online media

    The relationship between western countries and China is ambivalent. Only as a cheap production location and increasingly also as a basis for sales and...

    Russia’s GRU hackers hit the U.S. government and energy targets

    Some hackers have notoriety when it comes to the execution of their breach. GRU is one of these "elite" hacking gang. GRU is a Russian...

    U.S Offers $1 Million Bounty Reward for SEC Hackers

    (Left) Artem Radchenko (Right) Oleksandr Ieremenko   Two Ukrainians nationals, Viacheslavovich Radchenko and Oleksandr Vitalyevich Ieremenko are on the run from the law. The announcement did not...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox