Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday July 20 2018, @06:09PM   Printer-friendly
from the Windows-TCO dept.

Distributed Denial of Service (DDoS) attacks have been getting more polished, in what, who, and how they target their victims. Threatpost has an article looking at some of the changes over the recent years regarding new techniques, new targets, and a new class of attackers.

Several new themes are emerging in the 2018 distributed denial of service (DDoS) threat landscape, including a shift in tactics to reach new heights in volumetric campaigns, attacks that rely on a sheer wall of large amounts of packet traffic to overwhelm the capacity of a website and take it town.

However, while these traditional, opportunistic brute-force DDoS attacks remain a menace has emerged. These DDoS threats are more sophisticated and micro-targeted attacks. They take aim at, say, a specific application rather than a whole website. These type DDoS attacks are a rapidly growing threat, as are “low and slow” stealthier offensives. At the same time, bot herders are working on expanding their largely IoT-based botnet creations, by any means possible, often to accommodate demand from the DDoS-as-a-service offerings that have created a flood of new participants in the DDoS scene. Those new entrants are all competing for attack resources, creating a demand that criminals are all too happy to fulfill.

[...] One of the most notable evolutions in the DDoS landscape is the growth in the peak size of volumetric attacks. Attackers continue to use reflection/amplification techniques to exploit vulnerabilities in DNS, NTP, SSDP, CLDAP, Chargen and other protocols to maximize the scale of their attacks. Notably however, in February the world saw a 1.3 Tbps DDoS attack against GitHub—setting a record for volume (it was twice the size of the previous largest attack on record) and demonstrating that new amplification techniques can give unprecedented power to cybercriminals. Just five days later, an even larger attack launched, reaching 1.7 Tbps. These showed that DDoS attackers are more than able to keep up with the growing size of bandwidth pipes being used by businesses.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Friday July 20 2018, @06:57PM (3 children)

    by Anonymous Coward on Friday July 20 2018, @06:57PM (#710063)
    Humanity hasn't developed yet a 100% safe embedded OS that can be used in IoT. The existing devices are not designed for safety, update mechanisms are primitive (if available at all,) and the vendor has no interest in supporting last year's devices.
  • (Score: 0) by Anonymous Coward on Friday July 20 2018, @08:03PM (2 children)

    by Anonymous Coward on Friday July 20 2018, @08:03PM (#710097)

    L4 kernel is quite safe

    • (Score: 2) by Runaway1956 on Saturday July 21 2018, @01:54AM (1 child)

      by Runaway1956 (2926) Subscriber Badge on Saturday July 21 2018, @01:54AM (#710216) Journal

      And, you can explain why L4 is so safe?

      • (Score: 0) by Anonymous Coward on Sunday July 22 2018, @04:35PM

        by Anonymous Coward on Sunday July 22 2018, @04:35PM (#710801)

        They are probably talking about the seL4 microkernel. It has been proven to be functionally correct, uses capability-based resource management, is provably secure, and doesn't require the compiler to be trusted to maintain those guarantees. It is also actively developed, so it stays on top of hardware bugs that can undermine those goals.