As healthcare organizations update their technologies and pursue digital transformation, they heighten their network vulnerability by increasing their threat surfaces. Healthcare organizations can make tempting targets for botnet owners with large … [Read more...] about The Changing Challenges of Security in the Healthcare Industry
DDoS mitigation
Are there Best Practices for the Entire Internet to Help Mitigate Against DDoS Attacks?
There are ways in which the many stakeholders involved in improving the Internet can reduce the threat of DDoS attacks. One of the most notable examples of joint collaboration came out of the Network Working Group of the Internet Engineering Task … [Read more...] about Are there Best Practices for the Entire Internet to Help Mitigate Against DDoS Attacks?
Recursive GET and Random Recursive GET Attacks: What’s the Difference?
A Recursive GET attack is a variant of the Excessive Verb attack, or HTTP Flood, in which attackers send huge amounts of legitimate HTTP requests to a server to overwhelm it so that it will deny service to legitimate users. These can be in the form … [Read more...] about Recursive GET and Random Recursive GET Attacks: What’s the Difference?
What is a LAND Attack?
A LAND (Local Area Network Denial) attack is a DDOS attack that involves sending a special poison spoofed packet to a device, which makes it lock up. It also known as a Same Source/Dest Flood. The victim receives fake TCP SYN packets at an extremely … [Read more...] about What is a LAND Attack?
MarketsandMarkets Report Says DDoS Protection and Mitigation Market will be Worth 4.10 Billion by 2023
A new report published by MarketsandMarkets anticipates that the DDoS Protection and Mitigation Market size will grow from $1.94B in 2018 to $4.10B by 2023, at a Compound Annual Growth Rate (CAGR) of 16.1% across that period. The report aims to … [Read more...] about MarketsandMarkets Report Says DDoS Protection and Mitigation Market will be Worth 4.10 Billion by 2023
Anomaly-based DDoS Attack Detection, According to Tezpur University Researchers
Researchers in the Department of Computer Science & Engineering at Tezpur University, located in Assam, India published a long essay on Anomaly based DDoS Attack Detection in 2015 in the International Journal of Computer Applications. What … [Read more...] about Anomaly-based DDoS Attack Detection, According to Tezpur University Researchers
What are SSL-based DDoS Attacks and How to Mitigate Them
SSL (Secure Sockets Layer) is a standard security protocol used to establish encrypted links between a browser and server in online communication. Using SSL technology means that all data transmitted between server and browser is encrypted. A SSL or … [Read more...] about What are SSL-based DDoS Attacks and How to Mitigate Them
Princeton Machine Learning Detection of IoT DDoS
Researchers at Princeton just published a set of encouraging results showing that real-time detection of IoT DDoS attacks is possible using machine learning techniques. The Princeton team decided to focus on detecting IoT DDoS attacks because of … [Read more...] about Princeton Machine Learning Detection of IoT DDoS
The Two Classes of Feature Engineering Important to Detecting Attack IoT Traffic
There are two classes of features relevant to differentiating between normal and attack IoT traffic. These are stateless features, which are derived from flow-independent characteristics of individual packets and stateful features, which capture how … [Read more...] about The Two Classes of Feature Engineering Important to Detecting Attack IoT Traffic
Businesses Losing Significant Amounts of Money in DDoS Attacks, According to Corero
According to a new report from UK-based cybersecurity firm, Corero Network Security, businesses are increasingly losing significant amounts of money when a DDoS attack strikes. The report, which surveyed 327 security professionals worldwide, saw … [Read more...] about Businesses Losing Significant Amounts of Money in DDoS Attacks, According to Corero
Researchers Detect New Iot Botnet DDoS Attacks
According to new research by Recorded Future, Inc., a security company that specializes in machine-based threat intelligence, a new IoT botnet has been detected as the culprit behind a series of DDoS attacks on financial services companies earlier … [Read more...] about Researchers Detect New Iot Botnet DDoS Attacks
Nexusguard DDoS Threat Report for Q4-2017
Nexusguard, a specialist in DDoS attack mitigation, produces a security threat report on a quarterly basis, based on the real-time data it collects year-round on threats facing businesses and service-provider networks around the globe. Nexusguard … [Read more...] about Nexusguard DDoS Threat Report for Q4-2017
What is Load Balancing?
Load balancing is a form of efficiently distributing incoming network traffic across multiple backend servers, also known as a server farm. Today’s websites serve hundreds of thousands, if not millions, of simultaneous requests from users or … [Read more...] about What is Load Balancing?
Arbor Networks 13th Security Report: Key Findings
In October 2017, NETSCOUT Arbor collected data from 390 individuals within the operational security community to compile the company’s 13th annual Worldwide Infrastructure Security Report (WISR). 128 freeform and multiple choice questions were asked … [Read more...] about Arbor Networks 13th Security Report: Key Findings
What is Remotely-Triggered Black Hole (RTBH) Routing?
Remotely-Triggered Black Hole (RTBH) routing is a kind of application of BGP as a security tool within a service provider network. RTBH is frequently deployed in the mitigation of DDoS attacks, particularly when incoming traffic needs to be blocked … [Read more...] about What is Remotely-Triggered Black Hole (RTBH) Routing?