DDoS

Noteworthy

 Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

 We asked IT pros what's at stake during a DDoS attack. Here's what they said about downtime, losing customers and public trust.

 While the danger is hardly over, these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks.

Blogs

Verisign Mitigates 300 Gbps DDoS Attack and Other Q2 2014 DDoS Trends

It has been another busy quarter for the team that works on our DDoS Protection Services here at Verisign. As detailed in the recent release of our Q2 2014 DDoS Trends Report, from April to June of this year, we not only saw a jump in frequency and size of attacks against our customers, we witnessed the largest DDoS attack we've ever observed and mitigated -- an attack over 300 Gbps against one of our Media and Entertainment customers. more»

Six Approaches to Creating an Enterprise Cyber Intelligence Program

As few as seven years ago, cyber-threat intelligence was the purview of a small handful of practitioners, limited mostly to only the best-resourced organizations - primarily financial institutions that faced large financial losses due to cyber crime - and defense and intelligence agencies involved in computer network operations. Fast forward to today, and just about every business, large and small, is dependent on the Internet in some way for day-to-day operations, making cyber intelligence a critical component of a successful business plan. more»

Anti-Spoofing, BCP 38, and the Tragedy of the Commons

In the seminal 1968 paper "The Tragedy of the Commons" , Garrett Hardin introduced the world to an idea which eventually grew into a household phrase. In this blog article I will explore whether Hardin's tragedy applies to anti-spoofing and Distributed Denial of Service (DDoS) attacks in the Internet, or not... Hardin was a biologist and ecologist by trade, so he explains "The Tragedy of the Commons" using a field, cattle and herdsmen. more»

Painting Ourselves Into a Corner with Path MTU Discovery

In Tony Li's article on path MTU discovery we see this text: "The next attempt to solve the MTU problem has been Packetization Layer Path MTU Discovery (PLPMTUD). Rather than depending on ICMP messaging, in this approach, the transport layer depends on packet loss to determine that the packet was too big for the network. Heuristics are used to differentiate between MTU problems and congestion. Obviously, this technique is only practical for protocols where the source can determine that there has been packet loss. Unidirectional, unacknowledged transfers, typically using UDP, would not be able to use this mechanism. To date, PLPMTUD hasn't demonstrated a significant improvement in the situation." Tony's article is (as usual) quite readable and useful, but my specific concern here is DNS... more»

Do I need DDoS protection? A Realistic Look at the Decision Process

There has been a recent spate of well publicised Distributed Denial of Service (DDoS) attacks that bring websites down and render them useless, including Evernote and most recently Feedly. In light of this, here are some comments and tips to help companies evaluate and prepare not to be held for ransom or suffer lost reputation and sales as a result. more»

NANOG 61 - Impressions of Some Presentations

The recent NANOG 61 meeting was a pretty typical NANOG meeting, with a plenary stream, some interest group sessions, and an ARIN Public Policy session. The meeting attracted some 898 registered attendees, which was the biggest NANOG to date. No doubt the 70 registrations from Microsoft helped in this number, as the location for NANOG 61 was in Bellevue, Washington State, but even so the interest in NANOG continues to grow... more»

Introducing the Verisign Quarterly DDoS Trends Report

Today, I am very pleased to announce that Verisign is making its inaugural quarterly distributed denial of service (DDoS) trends report available. As the registry for .com and .net and a leading DDoS protection services provider, we have a unique view into online attack trends that enables us to collect attack statistics and behavioral trends that help inform the future outlook for Internet cyber security. more»

Recommendations for Adding Cybersecurity Intelligence to the Smart Grid

Over the last few years, there has been an increased effort to modernize the U.S. electric grid. Building a "Smart Grid" has been central in the effort to help utilities better manage their resources, minimize power outages and reduce energy consumption. However, adding more electronic devices and sensors to the grid's network has made it a prime target of cyberattacks, like Distributed Denial of Service (DDoS) attacks, which if successful, could cause wide-spread disruption of services affecting many other sectors. more»

Blocking Amplification Attacks: Sometimes the Incentives Work Against You

Since the end of last year, amplification attacks have been increasingly used by attackers and received heavy media coverage. Everyday protocols not given much thought before, like Network Time Protocol (NTP), can be asked in a very short remote command to send a very large response (list of 600 clients last connected to the NTP server) to a spoofed IP address (the target) by the requestor/attacker. more»

More Denial of Service Attacks

There are quite a lot of NTP-amplified denial of service attacks going around at the moment targeting tech and ecommerce companies, including some in the email space. What does NTP-amplifed mean? NTP is "Network Time Protocol" - it allows computers to set their clocks based on an accurate source, and keep them accurate. It's very widely used - OS X and Windows desktops typically use it by default, and most servers should have it running. more»

Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem

By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more»

Domain Name System (DNS) Security Should Be One of Your Priorities

Most people, even seasoned IT professionals, don't give DNS (the Domain Name System) the attention it deserves. As TCP/IP has become the dominant networking protocol, so has the use of DNS... Due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals don't spend much time worrying about it. This can be a huge mistake! more»

CircleID's Top 10 Posts of 2013

Here we are with CircleID's annual roundup of top ten most popular posts featured during 2013 (based on overall readership). Congratulations to all the participants whose posts reached top readership and best wishes to the entire community for 2014. more»

Identify DDoS Attacks with External Performance Monitoring (Part 2 of 3)

In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more»

Identify DDoS Attacks with Monitoring of Internal Applications (Part 1 of 3)

Most cloud DDoS mitigation services are offered on demand meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out -- quickly -- that it is under attack? Sometimes it is difficult to know. In this three part series, we will examine multiple monitoring tools companies can use to capture DDoS, which can help determine whether you are under a DDoS attack. more»

News Briefs

Google Announces Project Zero to Secure the Internet

DDoS Attacks Shutdown Several World Cup Websites

Popular RSS Reader Feedly Suffers Back to Back DDoS Attacks, Held for Ransom

Indonesia's Largest Telecom Provider Leaks Large Portions of the Global Routing Table

US Government Releases Cybersecurity Framework Proposal

Live Data Visualization of DDoS Attacks

Google Launches 'Project Shield': Anti-DDoS Service to Protect Free Expression Online

DDoS Awareness Day - Oct 23, Register Today for Live Virtual Event

Arrest Made in Connection to Spamhaus DDoS Case

U.S. CERT Issues Alert on DNS Amplification Attacks

Largest DDoS Attack To Date Aimed at Spamhaus Effects Global Internet Traffic

DDoS Attacks on US Banks This Week Peaked at 60 Gbps

DDoS Attacks Increased by 2000% in Past 3 Years, Asia Generating Over Half of Recent Attacks

Feds Shut Down File-Sharing Website Megaupload.com, Seven People Charged

South Korean Ruling Party Chief Offers Resignation Amidst DDoS Scandal

FBI Warns of Cyberattacks Against Banks - Aided by Variant of Zeus Trojan Called 'Gameover'

Report on Today's State of DNS Services

CAUCE Director Neil Schwartzman Wins Prestigious MAAWG Award

DDoS Attack Size Breaks 100 Gbps for First Time, Up 1000% Since 2005

Myanmar Internet Down from Massive DDoS Attack

Most Viewed

Most Commented

Neustar Updates – Sponsor

Neustar to Build Multiple Tbps DDoS Mitigation Platform

Neustar today announced that it is expanding its cloud-based mitigation platform and delivering new services to provide customers greater protection from malicious, constantly evolving DDoS (distributed denial-of-service) attacks. ›››

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

It's no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone's a target - including DNS providers like us. Neustar provides UltraDNS and recently dealt with an attack on our network that was massive by industry standards, impacting our customers and even our upstream providers. ›››

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

In the 2014 Neustar Annual DDoS Attacks and Impact Report, one team member described common DDoS mitigation scenarios. Here are some excerpts from the report. ›››

Smokescreening: Data Theft Makes DDoS More Dangerous

It's called "smokescreening" and it's costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property. ›››

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

dotStrategy, Co. the operator of the new Top Level Domain .BUZZ, announced today it has selected Neustar's Registry Threat Mitigation Services to support and protect the .BUZZ registry. ›››

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. ›››

Why Managed DNS Means Secure DNS

The current DNS protocol, "if my packets don't get through I'll just retransmit them and they're not critical" will no longer cut it in today's ever-changing security landscape. ›››

Industry Updates

Participants – Random Selection