Preparing for the next DDoS attack

2013; Elsevier BV; Volume: 2013; Issue: 5 Linguagem: Inglês

10.1016/s1353-4858(13)70058-8

ISSN

1872-9371

Autores

Steve McGregory,

Tópico(s)

Network Security and Intrusion Detection

Resumo

If your network or critical assets were under attack, are you confident that your policies and procedures would be followed? Have you done a 'fire drill' to see how your people react and your processes work, or if they work at all? Most likely, you haven't. But it seems that in the world of networking, half the people are trying to prevent the other half from compromising networks. This back and forth is an ongoing dance that seems to offer no simple victory. When thousands of hosts are used to attack a network or website, in a Distributed Denial of Service (DDoS) attack, the effects can be devastating. There are various methods of achieving these effects, from flooding a target with connection requests to huge numbers of requests for content. Steve McGregory of Ixia explains how these attacks work, how they are typically mounted, and what you can do about them.

Referência(s)
Altmetric
PlumX