nobbis writes:
"The recent KrebsOnSecurity 200 Gbps DDoS Attack used NTP servers for amplification, a technique that is becoming increasingly common according to Symantec NTP Reflection Attacks and Arbor Networks NTP Attacks.
A similar 400Gbps attack reported by Cloudflare against one of its clients 400 Gbps Attack was intense enough to cause network congestion in Europe.
Brian Krebs believes however that some of the DDoS-for-hire services behind the recent attacks maybe using Cloudflare as a safe haven, a view repudiated by Matthew Prince, CEO of Cloudflare.
The attack against the KrebsOnSecurity site is thought to have been a demonstration of ability from a Hackforums.net user offering a DDoS-for-hire service."
(Score: 2, Informative) by mrcoolbp on Sunday February 16 2014, @12:02AM
(Score:1^½, Radical)
(Score: 2) by janrinok on Sunday February 16 2014, @06:45PM
All that would be needed is for some arrests to be made. Once it is obvious that there is a price to pay for DDoS'ing a site it might reduce the frequency at which they occur. That would require intelligence to be collected - but isn't the NSA supposed to be able to do that?