• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Cloud Computing

Cloud Protection: DNS Redirect vs. BGP Redirect

March 31, 2018 By TheNewsTeam

During a DDoS attack, the re-direction of traffic in the cloud comes in two varieties: DNS redirect (for application layer protection) and BGP redirect (for network/transport layer protection). Redirecting Traffic via DNS Domain Name Servers (DNS) … [Read more...] about Cloud Protection: DNS Redirect vs. BGP Redirect

What are the Disadvantages to Cloud-based DDoS Scrubbing?

March 31, 2018 By TheNewsTeam

While there are many advantages to cloud-based DDoS scrubbing, which filters malicious traffic from legitimate, there are several disadvantages as well. These include: - Scrubbing centers are only able to monitor inbound traffic - As outbound … [Read more...] about What are the Disadvantages to Cloud-based DDoS Scrubbing?

What is Cloud-based DDoS Scrubbing?

March 31, 2018 By TheNewsTeam

Cloud-based scrubbing employs separate DDoS traffic-cleaning engines to ‘scrub’ clean traffic, filtering bad from good. It is essentially used as an additional layer of protection during a DDoS attack rather than a primary mitigation … [Read more...] about What is Cloud-based DDoS Scrubbing?

DDoS Mitigation in the Cloud: Part II

January 25, 2018 By TheNewsTeam

There are five general requirements to remove an attack in the cloud: (i) Detect the attack asap and determine its size; (ii) Attempt to mitigate its effects as much as is possible; (iii) Migrate the Virtual Machine (VM), which is under attack to … [Read more...] about DDoS Mitigation in the Cloud: Part II

DDoS Mitigation in the Cloud: Part I

January 25, 2018 By TheNewsTeam

DDoS mitigation in the cloud presents a new dimension to solutions offered in traditional computing environments. By its very nature, cloud computing is vulnerable to DoS and DDoS attacks, however, it also offers many opportunities to recover quickly … [Read more...] about DDoS Mitigation in the Cloud: Part I

Mitigating Against XML and HTTP-DoS and DDoS Attacks

January 25, 2018 By TheNewsTeam

There are various mitigation techniques specifically to guard against the most destructive kinds of DDoS attacks in the cloud: XML and HTTP-DoS attacks. Filtering Tree The XML consumer request is changed into a tree form and uses a virtual … [Read more...] about Mitigating Against XML and HTTP-DoS and DDoS Attacks

XML-DoS and HTTP-DoS Attacks in the Cloud

January 25, 2018 By TheNewsTeam

XML and HTTP DoS or DDoS attacks both aim to exhaust server resources. EXtensible Markup Language (XML) and HyperText Transfer Protocol (HTTP) are both used extensively in cloud computing web services. Not very much work has been done to ensure … [Read more...] about XML-DoS and HTTP-DoS Attacks in the Cloud

DDoS Attacks in Cloud Computing

January 25, 2018 By TheNewsTeam

Cloud computing allows on-demand access to a shared pool of resources, including networks, servers, storage and services. DoS and DDoS attacks are serious threats to the availability of services offered on the cloud because of the various new … [Read more...] about DDoS Attacks in Cloud Computing

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.