• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

UDP

DNSSEC and the Problems it Unintentionally Creates

April 5, 2018 By TheNewsTeam

DNSSEC stands for Domain Name System Security Extensions, the intention of which is to protect DNS entries from attacks. DNS Security has been a focus of recent ‘improved’ security procedures, and if properly configured, adds a helpful layer of … [Read more...] about DNSSEC and the Problems it Unintentionally Creates

Nexusguard DDoS Threat Report for Q4-2017

April 5, 2018 By TheNewsTeam

Nexusguard, a specialist in DDoS attack mitigation, produces a security threat report on a quarterly basis, based on the real-time data it collects year-round on threats facing businesses and service-provider networks around the globe. Nexusguard … [Read more...] about Nexusguard DDoS Threat Report for Q4-2017

Multi-Vector DDoS Attacks are on the Rise

April 5, 2018 By TheNewsTeam

Multi-vector DDoS attacks are when an attacker quickly shifts from launching one kind of DDoS attack to another to another. Chaining together different forms of DDoS attack has become a popular mode of attack since late 2015, and shows no sign of … [Read more...] about Multi-Vector DDoS Attacks are on the Rise

DDoS Case Study: Ababil, the Longest Cyber Attack in History

February 2, 2018 By TheNewsTeam

Operation Ababil began on September 18th, 2012 and continues to this day. It is the longest continuous cyber attack in history, comprised of multiple different waves and phases utilizing a variety of DDoS attack types. They were launched by the Cyber … [Read more...] about DDoS Case Study: Ababil, the Longest Cyber Attack in History

What is a DNS Flood?

December 23, 2017 By TheNewsTeam

A DNS Flood is a type of DDoS attack in which DNS is employed as a variant of a UDP Flood. Spoofed DNS request packets are sent at a high packet rate and from a large volume of source IP addresses. The victim’s DNS servers believe that these are … [Read more...] about What is a DNS Flood?

What is a UDP Flood?

December 23, 2017 By TheNewsTeam

A UDP Flood Attack involves the sending of highly-spoofed UDP packets at an extremely high packet rate using a wide source IP range. The unexpectedly high volume of incoming UDP packets overwhelms the victim’s network, exhausting its resources and … [Read more...] about What is a UDP Flood?

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.