DDoS mitigation in the cloud presents a new dimension to solutions offered in traditional computing environments. By its very nature, cloud computing is vulnerable to DoS and DDoS attacks, however, it also offers many opportunities to recover quickly … [Read more...] about DDoS Mitigation in the Cloud: Part I
mitigation
What is an ICMP Flood?
An ICMP Flood involves an attacker sending fraudulent ICMP packets at volumes significant enough to flood a network. The unexpected volume of the incoming spoofed ICMP packets from a large set of source IP overwhelms the victim’s network, consuming … [Read more...] about What is an ICMP Flood?
What is an IP Fragmentation Attack?
There are various kinds of IP fragmentation attacks, and they are a fairly common form of DDoS attack. All fragmentation attacks involve the breakdown of datagrams to overbear the target networks, but the difference lies in how the attack vectors are … [Read more...] about What is an IP Fragmentation Attack?
What is a SYN Flood?
A SYN flood, aka TCP-SYN flood, is one of the oldest forms of DDoS attacks, whose goal is to make a server unavailable to legitimate traffic by consuming all the server’s available resources. The attacker repeatedly sends initial connection request … [Read more...] about What is a SYN Flood?
What is DNS Amplification?
A Domain Name Server (DNS) Amplification Attack is a Distributed Denial of Service (DDoS) attack in which the attacker exploits vulnerabilities in publicly accessible DNS servers to turn initially small queries into much larger payloads, which are … [Read more...] about What is DNS Amplification?