Posts

Showing posts from February, 2020

How to Fight DDoS

"You can’t stop one from starting; that is out of your control," Morales said about the chances of an enterprise being hit by a DDoS. Denial service attack There are, however, steps that an enterprise can take to help mitigate risk. Bandwidth is helpful, but it's not sufficient to deflect all types of modern attacks. "Purpose-built, on-premise DDoS protection enables the enterprise to remain in control of mitigations for the majority of DDoS attacks today," Morales said. "However, if you are facing a large volumetric attack, that is best mitigated in the cloud." Third party services, including those from Akamai, VeriSign and CloudFlare, all aim to offer cloud-based DDoS protections. Morales' company, Arbor, recommends a layered approach that combines on-premise DDoS protection with cloud-based protection from a service provider.

The advent of DDoS-for-hire services

The advent of DDoS-for-hire services means that even the least tech-savvy individual can exact  revenge on some website. Step on up to the counter and purchase a stresser that can systemically take down a company. According to Neustar, almost three quarters of all global brands, organizations and companies have been victims of a DDoS attack. And more than 3,700 DDoS attacks occur each day. what happens during a ddos attack ? Chase Cunningham, director of cyber operations at A10 Networks, said to find IoT-enabled devices, all you have to do is go on an underground site and ask around for the Mirai scanner code. Once you have that you can scan for anything talking to the internet that can be used for that type of attack.  “Or you can go to a site like Shodan and craft a couple of simple queries to look for device specific requests. Once you get that information you just go to your DDoS for hire tool and change the configuration to point at the right target and use the right type