• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

DDoS mitigation

The Changing Challenges of Security in the Healthcare Industry

May 4, 2018 By TheNewsTeam

As healthcare organizations update their technologies and pursue digital transformation, they heighten their network vulnerability by increasing their threat surfaces. Healthcare organizations can make tempting targets for botnet owners with large … [Read more...] about The Changing Challenges of Security in the Healthcare Industry

Are there Best Practices for the Entire Internet to Help Mitigate Against DDoS Attacks?

May 4, 2018 By TheNewsTeam

There are ways in which the many stakeholders involved in improving the Internet can reduce the threat of DDoS attacks. One of the most notable examples of joint collaboration came out of the Network Working Group of the Internet Engineering Task … [Read more...] about Are there Best Practices for the Entire Internet to Help Mitigate Against DDoS Attacks?

Recursive GET and Random Recursive GET Attacks: What’s the Difference?

April 26, 2018 By TheNewsTeam

A Recursive GET attack is a variant of the Excessive Verb attack, or HTTP Flood, in which attackers send huge amounts of legitimate HTTP requests to a server to overwhelm it so that it will deny service to legitimate users. These can be in the form … [Read more...] about Recursive GET and Random Recursive GET Attacks: What’s the Difference?

What is a LAND Attack?

April 26, 2018 By TheNewsTeam

A LAND (Local Area Network Denial) attack is a DDOS attack that involves sending a special poison spoofed packet to a device, which makes it lock up. It also known as a Same Source/Dest Flood. The victim receives fake TCP SYN packets at an extremely … [Read more...] about What is a LAND Attack?

MarketsandMarkets Report Says DDoS Protection and Mitigation Market will be Worth 4.10 Billion by 2023

April 25, 2018 By TheNewsTeam

A new report published by MarketsandMarkets anticipates that the DDoS Protection and Mitigation Market size will grow from $1.94B in 2018 to $4.10B by 2023, at a Compound Annual Growth Rate (CAGR) of 16.1% across that period. The report aims to … [Read more...] about MarketsandMarkets Report Says DDoS Protection and Mitigation Market will be Worth 4.10 Billion by 2023

Anomaly-based DDoS Attack Detection, According to Tezpur University Researchers

April 20, 2018 By TheNewsTeam

Researchers in the Department of Computer Science & Engineering at Tezpur University, located in Assam, India published a long essay on Anomaly based DDoS Attack Detection in 2015 in the International Journal of Computer Applications. What … [Read more...] about Anomaly-based DDoS Attack Detection, According to Tezpur University Researchers

What are SSL-based DDoS Attacks and How to Mitigate Them

April 20, 2018 By TheNewsTeam

SSL (Secure Sockets Layer) is a standard security protocol used to establish encrypted links between a browser and server in online communication. Using SSL technology means that all data transmitted between server and browser is encrypted. A SSL or … [Read more...] about What are SSL-based DDoS Attacks and How to Mitigate Them

Princeton Machine Learning Detection of IoT DDoS

April 20, 2018 By TheNewsTeam

Researchers at Princeton just published a set of encouraging results showing that real-time detection of IoT DDoS attacks is possible using machine learning techniques. The Princeton team decided to focus on detecting IoT DDoS attacks because of … [Read more...] about Princeton Machine Learning Detection of IoT DDoS

The Two Classes of Feature Engineering Important to Detecting Attack IoT Traffic

April 20, 2018 By TheNewsTeam

There are two classes of features relevant to differentiating between normal and attack IoT traffic. These are stateless features, which are derived from flow-independent characteristics of individual packets and stateful features, which capture how … [Read more...] about The Two Classes of Feature Engineering Important to Detecting Attack IoT Traffic

Businesses Losing Significant Amounts of Money in DDoS Attacks, According to Corero

April 19, 2018 By TheNewsTeam

According to a new report from UK-based cybersecurity firm, Corero Network Security, businesses are increasingly losing significant amounts of money when a DDoS attack strikes. The report, which surveyed 327 security professionals worldwide, saw … [Read more...] about Businesses Losing Significant Amounts of Money in DDoS Attacks, According to Corero

Researchers Detect New Iot Botnet DDoS Attacks

April 19, 2018 By TheNewsTeam

According to new research by Recorded Future, Inc., a security company that specializes in machine-based threat intelligence, a new IoT botnet has been detected as the culprit behind a series of DDoS attacks on financial services companies earlier … [Read more...] about Researchers Detect New Iot Botnet DDoS Attacks

Nexusguard DDoS Threat Report for Q4-2017

April 5, 2018 By TheNewsTeam

Nexusguard, a specialist in DDoS attack mitigation, produces a security threat report on a quarterly basis, based on the real-time data it collects year-round on threats facing businesses and service-provider networks around the globe. Nexusguard … [Read more...] about Nexusguard DDoS Threat Report for Q4-2017

What is Load Balancing?

April 3, 2018 By TheNewsTeam

Load balancing is a form of efficiently distributing incoming network traffic across multiple backend servers, also known as a server farm. Today’s websites serve hundreds of thousands, if not millions, of simultaneous requests from users or … [Read more...] about What is Load Balancing?

Arbor Networks 13th Security Report: Key Findings

April 2, 2018 By TheNewsTeam

In October 2017, NETSCOUT Arbor collected data from 390 individuals within the operational security community to compile the company’s 13th annual Worldwide Infrastructure Security Report (WISR). 128 freeform and multiple choice questions were asked … [Read more...] about Arbor Networks 13th Security Report: Key Findings

What is Remotely-Triggered Black Hole (RTBH) Routing?

March 31, 2018 By TheNewsTeam

Remotely-Triggered Black Hole (RTBH) routing is a kind of application of BGP as a security tool within a service provider network. RTBH is frequently deployed in the mitigation of DDoS attacks, particularly when incoming traffic needs to be blocked … [Read more...] about What is Remotely-Triggered Black Hole (RTBH) Routing?

Next Page »

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.