In late 2016, a Turkish hacker attempted to encourage DDoS attacks by turning it into a game, offering points and prizes for hackers who attempted to shut down certain political websites. The hacker set up a platform, which translates to ‘Surface … [Read more...] about DDos Case Study: the Turkish Hacker who Wanted to Turn DDoS into a Game
DDoS Mitigation Strategy: 5 Essentials
One of the tips often given to security experts for mitigating DDoS attacks is to themselves think like a crook. Imagine playing the DDoS game yourself, looking for the secret passage to break through, working out what the vulnerability where you can … [Read more...] about DDoS Mitigation Strategy: 5 Essentials
Five Ways in Which Individuals Can Protect Themselves Against DDoS
It is not only up to the big companies to help prevent DDoS attacks, every individual can take simple actions to make our devices less susceptible to being taken over by a botnet. DDoS attacks rely upon a network of infected devices to create the … [Read more...] about Five Ways in Which Individuals Can Protect Themselves Against DDoS
DDoS Case Study: Phil Nagy and the Winning Poker Network
Just As Phil Nagy, the founder of the Winning Poker Network and American Cardroom, was holding a big tournament last summer, his network was struck by a powerful denial-of-service attack, which forced Nagy into postponing or scrapping various events. … [Read more...] about DDoS Case Study: Phil Nagy and the Winning Poker Network
The Men Behind Mirai
Last month, three men pleaded guilty to creating the Mirai botnet, in which hundreds of thousands of connected digital video records, routers and cameras were used to launch a massive DDoS attack against the domain name services company, Dyn for an … [Read more...] about The Men Behind Mirai
DDoS Mitigation in the Cloud: Part II
There are five general requirements to remove an attack in the cloud: (i) Detect the attack asap and determine its size; (ii) Attempt to mitigate its effects as much as is possible; (iii) Migrate the Virtual Machine (VM), which is under attack to … [Read more...] about DDoS Mitigation in the Cloud: Part II
DDoS Mitigation in the Cloud: Part I
DDoS mitigation in the cloud presents a new dimension to solutions offered in traditional computing environments. By its very nature, cloud computing is vulnerable to DoS and DDoS attacks, however, it also offers many opportunities to recover quickly … [Read more...] about DDoS Mitigation in the Cloud: Part I
Mitigating Against XML and HTTP-DoS and DDoS Attacks
There are various mitigation techniques specifically to guard against the most destructive kinds of DDoS attacks in the cloud: XML and HTTP-DoS attacks. Filtering Tree The XML consumer request is changed into a tree form and uses a virtual … [Read more...] about Mitigating Against XML and HTTP-DoS and DDoS Attacks
XML-DoS and HTTP-DoS Attacks in the Cloud
XML and HTTP DoS or DDoS attacks both aim to exhaust server resources. EXtensible Markup Language (XML) and HyperText Transfer Protocol (HTTP) are both used extensively in cloud computing web services. Not very much work has been done to ensure … [Read more...] about XML-DoS and HTTP-DoS Attacks in the Cloud
DDoS Attacks in Cloud Computing
Cloud computing allows on-demand access to a shared pool of resources, including networks, servers, storage and services. DoS and DDoS attacks are serious threats to the availability of services offered on the cloud because of the various new … [Read more...] about DDoS Attacks in Cloud Computing
Shopper Holiday DDoS Attacks
Shopper holiday DDoS attacks are nothing new. Back in 2009, a DDoS attack on a major DNS provider took some of the web’s biggest online stores offline. The websites for Amazon and Wal-Mart were both taken down for an hour at the peak of the … [Read more...] about Shopper Holiday DDoS Attacks
Gamer Holiday DDoS Attacks
Gamer holiday DDoS attacks are not a new phenomenon. The end of year holiday period has become a time for increased DDoS attacks, particularly those targeted at gamers. The holidays usually see growth spurts in the number of gamers online, keen to … [Read more...] about Gamer Holiday DDoS Attacks
Player Advantage DDoS Attacks: the Beginnings of DDoS
Player advantage DDoS attacks fall into a similar attack motivation bracket as business rivalry motivated attacks. We wrote elsewhere about this. Taking down or slowing the service of a rival competitor can significantly affect their bottom line, … [Read more...] about Player Advantage DDoS Attacks: the Beginnings of DDoS
What is Second-Hand DDoS?
As enterprises increasingly depend on hosted infrastructure and services, they are placing themselves at greater risk of second-hand DDoS attacks. The size and scale of hosting or datacentre operator network infrastructures and their huge customer … [Read more...] about What is Second-Hand DDoS?
Smokescreen DDoS Attacks
DDoS attacks are employed as a smokescreen for other more malicious cyberattacks more often than you might think. The swarming nature of DDoS can be an effective distraction technique; as cybersecurity teams focus on mitigating the attack and getting … [Read more...] about Smokescreen DDoS Attacks