Preparing for the next DDoS attack
2013; Elsevier BV; Volume: 2013; Issue: 5 Linguagem: Inglês
10.1016/s1353-4858(13)70058-8
ISSN1872-9371
Autores Tópico(s)Network Security and Intrusion Detection
ResumoIf your network or critical assets were under attack, are you confident that your policies and procedures would be followed? Have you done a 'fire drill' to see how your people react and your processes work, or if they work at all? Most likely, you haven't. But it seems that in the world of networking, half the people are trying to prevent the other half from compromising networks. This back and forth is an ongoing dance that seems to offer no simple victory. When thousands of hosts are used to attack a network or website, in a Distributed Denial of Service (DDoS) attack, the effects can be devastating. There are various methods of achieving these effects, from flooding a target with connection requests to huge numbers of requests for content. Steve McGregory of Ixia explains how these attacks work, how they are typically mounted, and what you can do about them.
Referência(s)