Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday July 20 2018, @06:09PM   Printer-friendly
from the Windows-TCO dept.

Distributed Denial of Service (DDoS) attacks have been getting more polished, in what, who, and how they target their victims. Threatpost has an article looking at some of the changes over the recent years regarding new techniques, new targets, and a new class of attackers.

Several new themes are emerging in the 2018 distributed denial of service (DDoS) threat landscape, including a shift in tactics to reach new heights in volumetric campaigns, attacks that rely on a sheer wall of large amounts of packet traffic to overwhelm the capacity of a website and take it town.

However, while these traditional, opportunistic brute-force DDoS attacks remain a menace has emerged. These DDoS threats are more sophisticated and micro-targeted attacks. They take aim at, say, a specific application rather than a whole website. These type DDoS attacks are a rapidly growing threat, as are “low and slow” stealthier offensives. At the same time, bot herders are working on expanding their largely IoT-based botnet creations, by any means possible, often to accommodate demand from the DDoS-as-a-service offerings that have created a flood of new participants in the DDoS scene. Those new entrants are all competing for attack resources, creating a demand that criminals are all too happy to fulfill.

[...] One of the most notable evolutions in the DDoS landscape is the growth in the peak size of volumetric attacks. Attackers continue to use reflection/amplification techniques to exploit vulnerabilities in DNS, NTP, SSDP, CLDAP, Chargen and other protocols to maximize the scale of their attacks. Notably however, in February the world saw a 1.3 Tbps DDoS attack against GitHub—setting a record for volume (it was twice the size of the previous largest attack on record) and demonstrating that new amplification techniques can give unprecedented power to cybercriminals. Just five days later, an even larger attack launched, reaching 1.7 Tbps. These showed that DDoS attackers are more than able to keep up with the growing size of bandwidth pipes being used by businesses.


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 1, Insightful) by Anonymous Coward on Friday July 20 2018, @06:13PM (4 children)

    by Anonymous Coward on Friday July 20 2018, @06:13PM (#710045)

    As we all know: Diversity is our strength.

    • (Score: -1, Offtopic) by Anonymous Coward on Friday July 20 2018, @06:21PM

      by Anonymous Coward on Friday July 20 2018, @06:21PM (#710047)

      You imply bias in the the hiring process is what is causing the gender imbalance in tech. Indicators such university enrollment in CS programs show that this is unlikely to be the case.

      If you are wrong, that there definitely isn't some inherit genetic behavioral bias influencing job choice, than the bias is happening before students finish highschool.

      I'm a proponent for an "early bias" theory because of far lower female graduation and entry level application rates to CS jobs. If less than 25% of CS graduates are female, which is currently the case, it strongly suggests that attempting to make the engineering team 50% female will result in a lower hiring bar for women. That means that the overall point of the your manifesto, that programs designed to specifically increase the ratio of female engineers are unfair, is true.

      We need to do something about the low number of women going into tech fields in school. Punishing companies for not hiring women when the vast majority of candidates are men is a perverse incentive that is biased against men and doesn't fix the real problem.

      It's like punishing someone for taking more yellow onions at the market when there's 3 times as many nice looking ones as white onions. The right way to fix the imbalance is to increase the supply of white onions. In the real world, farmers would begin switching to white onions and the supply would increase. Unfortunately, our supply of women is governed by a mostly government run school system that doesn't exist in a world of supply and demand and likes to shift the blame for their ineptitude.

      Fixing this at the education level would mean owning up to a mistake. It's much easier to just fine everyone to make it look like you're fixing a "problem" caused by inadequate regulations.

    • (Score: -1, Offtopic) by Anonymous Coward on Friday July 20 2018, @06:24PM (1 child)

      by Anonymous Coward on Friday July 20 2018, @06:24PM (#710051)

      From my understanding the yellow eyes only occur during times that the Sith are closest to the dark side. I believe this is mentioned in the commentary on either the DVD release or the blu rays.

      If you'll notice, when Anakin attacks the Jedi temple, his eyes were normal. Plapatine told him after the attack on the temple he would be strong enough to feel the full power of the dark side.

      You'll also notice that his eyes go yellow after slaughtering all the seperatists, which would be a huge spike in the use of the Dark side.

      They go back to normal when Padme arrives. They are also normal while fighting Obi Wan. His eyes go yellow as his rage and hate fill him when Obi deals what should have been a death stroke, and (my opinion here) he hates Obi Wan even more for letting him suffer.

      You'll notice in ROTJ, His eyes are back to his normal colors as well.

      As for Dooku, He was a Sith Lord, but I honestly think he was a Sith Lord trying to do right. More of a Grey Sith Lord than a true Dark Lord. He's never really put into a situation where he would have to call upon the full power of the Dark Side. You'll notice even during his duel with Yoda, he appears to duel only to find a way out and run. Same with His Duels with Anakin and Obi Wan.

      Now for the Emperor, There is no doubt he is under the full influence of the Dark Side at all times. Once he made his "Change" into his true form, his eyes remain Yellow all the time, but when he was Senator Palpatine, he avoided using the Dark Side any more than he had so that he could remain in hiding.

      Hope this helps!

      • (Score: 2, Interesting) by Anonymous Coward on Friday July 20 2018, @07:52PM

        by Anonymous Coward on Friday July 20 2018, @07:52PM (#710091)

        I think I get it. These two posts are meta. You're DDoSing us with words.

    • (Score: 2) by Runaway1956 on Saturday July 21 2018, @01:09AM

      by Runaway1956 (2926) Subscriber Badge on Saturday July 21 2018, @01:09AM (#710194) Journal

      Bigger, better - check. Diversity - check. So, it's a bipartisan thing.

  • (Score: 0) by Anonymous Coward on Friday July 20 2018, @06:23PM (3 children)

    by Anonymous Coward on Friday July 20 2018, @06:23PM (#710049)

    However, while these traditional, opportunistic brute-force DDoS attacks remain a menace has emerged.

    This sentence is so bad, I gave up reading the summary. Is that really copied accurately?

    • (Score: 0) by Anonymous Coward on Friday July 20 2018, @07:08PM

      by Anonymous Coward on Friday July 20 2018, @07:08PM (#710072)

      Normally I'd say canopic jug had another stroke, but in this case it matches TFA.

    • (Score: 0) by Anonymous Coward on Friday July 20 2018, @08:34PM (1 child)

      by Anonymous Coward on Friday July 20 2018, @08:34PM (#710105)

      It needs another comma.

      However, while these traditional, opportunistic brute-force DDoS attacks remain, a menace has emerged.

      • (Score: 2) by Runaway1956 on Saturday July 21 2018, @01:10AM

        by Runaway1956 (2926) Subscriber Badge on Saturday July 21 2018, @01:10AM (#710198) Journal

        The comma doesn't really help a lot. It remains an awkward sentence. I should know an awkward sentence, since I find myself writing them often enough.

  • (Score: 3, Insightful) by bob_super on Friday July 20 2018, @06:23PM (5 children)

    by bob_super (1357) on Friday July 20 2018, @06:23PM (#710050)

    > bot herders are working on expanding their largely IoT-based botnet creations

    Maybe some white hackers have to use those same IoT holes to brick every fucking IoT device that hasn't received a patch in the last two months (aka all of them).
    Once enough end-customers start screaming at the manufacturers and demanding refunds with prejudice, maybe those guys will stop peddling unsupported crap unscathed.
    The river is already on fire, and the EPA nowhere to be found. Time to hit the polluters at the wallet.

    • (Score: 0) by Anonymous Coward on Friday July 20 2018, @06:57PM (3 children)

      by Anonymous Coward on Friday July 20 2018, @06:57PM (#710063)
      Humanity hasn't developed yet a 100% safe embedded OS that can be used in IoT. The existing devices are not designed for safety, update mechanisms are primitive (if available at all,) and the vendor has no interest in supporting last year's devices.
      • (Score: 0) by Anonymous Coward on Friday July 20 2018, @08:03PM (2 children)

        by Anonymous Coward on Friday July 20 2018, @08:03PM (#710097)

        L4 kernel is quite safe

        • (Score: 2) by Runaway1956 on Saturday July 21 2018, @01:54AM (1 child)

          by Runaway1956 (2926) Subscriber Badge on Saturday July 21 2018, @01:54AM (#710216) Journal

          And, you can explain why L4 is so safe?

          • (Score: 0) by Anonymous Coward on Sunday July 22 2018, @04:35PM

            by Anonymous Coward on Sunday July 22 2018, @04:35PM (#710801)

            They are probably talking about the seL4 microkernel. It has been proven to be functionally correct, uses capability-based resource management, is provably secure, and doesn't require the compiler to be trusted to maintain those guarantees. It is also actively developed, so it stays on top of hardware bugs that can undermine those goals.

    • (Score: 2) by Runaway1956 on Saturday July 21 2018, @01:15AM

      by Runaway1956 (2926) Subscriber Badge on Saturday July 21 2018, @01:15AM (#710200) Journal

      Well, brick at least 90% of them. Those that aren't connected to any network are alright. I have one "smart" device in the house. It's been blocked from connecting to the WIFI. It can talk to the wife all day long, for all I care, but it's blacklisted on WIFI. It sits there, and does it's idiot thing, and no one pays it any mind. If, one day, it decides that it isn't going to work anymore because it can't "update", I'll just shoot it.

  • (Score: 3, Interesting) by Revek on Friday July 20 2018, @06:57PM

    by Revek (5022) on Friday July 20 2018, @06:57PM (#710062)

    A few years ago we would get hit with what I call a calibration surge. We would get packeted for 2 or three times our bandwidth. Enough our upstream carrier would blackhole the IP being hit. It was usually udp traffic on various ports. Now I barely notice them on the traffic graph. I do still see them on packet graphs and netflow searches. They are finely tuned to knock out the customer with out tripping any alarms.

    --
    This page was generated by a Swarm of Roaming Elephants
  • (Score: 3, Funny) by JoeMerchant on Friday July 20 2018, @07:00PM (1 child)

    by JoeMerchant (3937) on Friday July 20 2018, @07:00PM (#710067)

    That was all the GitHub project owners copying their stuff off of GitHub to other places.

    --
    🌻🌻 [google.com]
    • (Score: 2) by Gaaark on Friday July 20 2018, @08:37PM

      by Gaaark (41) on Friday July 20 2018, @08:37PM (#710107) Journal

      Probably you're quite correct, lol.

      The MS-buy purge to other gits. :)

      --
      --- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
(1)