A Recursive GET attack is a variant of the Excessive Verb attack, or HTTP Flood, in which attackers send huge amounts of legitimate HTTP requests to a server to overwhelm it so that it will deny service to legitimate users. These can be in the form … [Read more...] about Recursive GET and Random Recursive GET Attacks: What’s the Difference?
Types of Attack
A LAND (Local Area Network Denial) attack is a DDOS attack that involves sending a special poison spoofed packet to a device, which makes it lock up. It also known as a Same Source/Dest Flood. The victim receives fake TCP SYN packets at an extremely … [Read more...] about What is a LAND Attack?
In a specially crafted packet attack, attackers customize their approach to DDoS. Attention from the security community has recently focused more on these kinds of fragmented and application-layer DDoS attacks, in addition to the volumetric and … [Read more...] about What is a Specially Crafted DDoS Attack?
SSL (Secure Sockets Layer) is a standard security protocol used to establish encrypted links between a browser and server in online communication. Using SSL technology means that all data transmitted between server and browser is encrypted. A SSL or … [Read more...] about What are SSL-based DDoS Attacks and How to Mitigate Them
The PBot botnet was the most significant DDoS malware around in Q2 2017. Malicious actors employed decades-old PHP code to craft the largest attack that security firm Akamai observed in the second quarter of last year, according to its quarterly … [Read more...] about What was the PBot Botnet?
DNSSEC stands for Domain Name System Security Extensions, the intention of which is to protect DNS entries from attacks. DNS Security has been a focus of recent ‘improved’ security procedures, and if properly configured, adds a helpful layer of … [Read more...] about DNSSEC and the Problems it Unintentionally Creates
Multi-vector DDoS attacks are when an attacker quickly shifts from launching one kind of DDoS attack to another to another. Chaining together different forms of DDoS attack has become a popular mode of attack since late 2015, and shows no sign of … [Read more...] about Multi-Vector DDoS Attacks are on the Rise
The tools for launching the record-setting MemCached DDoS attacks of early March were made public shortly afterwards. Proof-of-concept code named “MemCached-DDoS-Exploit” was posted on GitHub, listed as a “DDoS attack tool for sending forged UDP … [Read more...] about Code for MemCached DDoS Attacks Made Public
Over the past week, it has become clear that attackers are seizing the memached DDoS attack vector as an opportunity to extract payments from attacked companies. Akamai reported that a group of DDoS attacks executed using memcached servers were … [Read more...] about MemCached DDoS and Ransomware
Researchers at DDoS protection firm Corero Network Security have released a post stating that the memcached amplification attacks that hit GitHub and other networks over the last week with the largest ever DDoS attacks can be disarmed with a … [Read more...] about Corero Issues a “Kill Switch” Against MemCaching DDoS Attacks
Memcached is a tool used to cache data and lessen strain on large data stores, such as disk or databases. The memcached protocol involves the server being queried for information about key value stories. It was built to be used on systems that are … [Read more...] about What is Memcached DDoS?
Last week, code repository GitHub experienced the most powerful DDoS attack recorded to date at 1.35 Tbps. No botnet was required, and it used an increasingly popular DDoS method. GitHub’s site was only down for 10 minutes as it automatically … [Read more...] about Massive Memcached DDoS Attacks Mark Largest Ever
Akamai’s latest security report, focused on Q4 2017, noted that DDoS attacks went up by 14% year-on-year. Application-layer attacks rose by 115% quarter by quarter, however, they still comprised under 1% of all DDoS attacks. Year-on-year, there was … [Read more...] about Key Takeaways on DDoS from Akamai’s Q4 2017 Report
There are various mitigation techniques specifically to guard against the most destructive kinds of DDoS attacks in the cloud: XML and HTTP-DoS attacks. Filtering Tree The XML consumer request is changed into a tree form and uses a virtual … [Read more...] about Mitigating Against XML and HTTP-DoS and DDoS Attacks
XML and HTTP DoS or DDoS attacks both aim to exhaust server resources. EXtensible Markup Language (XML) and HyperText Transfer Protocol (HTTP) are both used extensively in cloud computing web services. Not very much work has been done to ensure … [Read more...] about XML-DoS and HTTP-DoS Attacks in the Cloud