• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Mitigation Techniques

What are SSL-based DDoS Attacks and How to Mitigate Them

April 20, 2018 By TheNewsTeam

SSL (Secure Sockets Layer) is a standard security protocol used to establish encrypted links between a browser and server in online communication. Using SSL technology means that all data transmitted between server and browser is encrypted. A SSL or … [Read more...] about What are SSL-based DDoS Attacks and How to Mitigate Them

What is The Digital Attack Map?

February 9, 2018 By TheNewsTeam

The Digital Attack Map is a free online resource, which allows you to observe in real time the top DDoS attacks worldwide on a daily basis. Data shown represents only the top 1% of reported attacks around the world. The map allows you to search … [Read more...] about What is The Digital Attack Map?

How the FBI took down the Mirai creators

February 9, 2018 By TheNewsTeam

At the end of last year, the FBI filed charges against the creators of Mirai, the largest DDoS attack of its kind when it struck the DNS provider, Dyn in October 2016 and took down the sites for some of the largest companies in the U.S., including … [Read more...] about How the FBI took down the Mirai creators

DDoS Mitigation in the Cloud: Part I

January 25, 2018 By TheNewsTeam

DDoS mitigation in the cloud presents a new dimension to solutions offered in traditional computing environments. By its very nature, cloud computing is vulnerable to DoS and DDoS attacks, however, it also offers many opportunities to recover quickly … [Read more...] about DDoS Mitigation in the Cloud: Part I

Mitigating Against XML and HTTP-DoS and DDoS Attacks

January 25, 2018 By TheNewsTeam

There are various mitigation techniques specifically to guard against the most destructive kinds of DDoS attacks in the cloud: XML and HTTP-DoS attacks. Filtering Tree The XML consumer request is changed into a tree form and uses a virtual … [Read more...] about Mitigating Against XML and HTTP-DoS and DDoS Attacks

What Are SYN Cookies?

December 15, 2017 By TheNewsTeam

When cryptologists Daniel J. Bernstein and Jeff Weisberg made SYN cookies mainstream as a way of mitigating SYN floods, the problem was considered insoluble. It was September 1996, following the SYN flood, which had shut down the mail service for … [Read more...] about What Are SYN Cookies?

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.