DDoS of Things: Survival Guide


Title : DDoS of Things: Survival Guide
Edition : 
Year : 2017
Authors : A10
Publisher : A10


Preface
Cyclical Threat Trends
Cyber attack strategies always evolve. But 2016 witnessed the resurgence of traditional attack strategies, blended with new twists, that the world was ill prepared to defend. 
Leading this advancement were IoT-based distributed denial of service (DDoS) attacks. This tactic leverages open-source malware (e.g., Mirai, Leet) that takes advantage of lax security implementations in connected smart devices to build massive botnets able to deploy DDoS payloads that surpass 1 Tbps throughputs.  

This is the DDoS of Things.
DDoS attacks have always been an issue for organizations, businesses and service providers, yet for the most part they were kept in check. This was partly due to the majority of threat actors not having the bandwidth to exceed the security measures of large organizations.
That theory played out in the numbers, too. There was a 71 percent year-over-year increase in DDoS attacks from Q3 2015 to Q3 2016, yet the standard attack was still under 100 Gbps. Akamai reported that there were 19 “mega-attacks” that topped the century threshold, but the bandwidth at the disposal of threat actors was still somewhat limited.
Since the Mirai source code was openly published in the second half of 2016 — and soon followed by rival malware Leet — DDoS attacks have easily pushed past 600 Gbps thresholds, with some cases exceeding 1 Tbps in bandwidth.
There is good news, however. Mirai and Leet don’t change how DDoS attacks work. The malware simply gave malicious groups the means to do it better and faster. Most DDoS attacks still fall into three specific categories: network, application and amplification attacks. This guide dissects each attack type, explains why they work and outlines best mitigation techniques for each.


Password zip : gratissbuku.blogspot.co.id

Comments

Popular posts from this blog

Software Architecture with Python

Web Scraping with Python

Android Design Patterns and Best Practice