DDoS

Noteworthy

 While the danger is hardly over, these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks.

 Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

 We asked IT pros what's at stake during a DDoS attack. Here's what they said about downtime, losing customers and public trust.

Blogs

Blocking Amplification Attacks: Sometimes the Incentives Work Against You

Since the end of last year, amplification attacks have been increasingly used by attackers and received heavy media coverage. Everyday protocols not given much thought before, like Network Time Protocol (NTP), can be asked in a very short remote command to send a very large response (list of 600 clients last connected to the NTP server) to a spoofed IP address (the target) by the requestor/attacker. more»

More Denial of Service Attacks

There are quite a lot of NTP-amplified denial of service attacks going around at the moment targeting tech and ecommerce companies, including some in the email space. What does NTP-amplifed mean? NTP is "Network Time Protocol" - it allows computers to set their clocks based on an accurate source, and keep them accurate. It's very widely used - OS X and Windows desktops typically use it by default, and most servers should have it running. more»

Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem

By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more»

Domain Name System (DNS) Security Should Be One of Your Priorities

Most people, even seasoned IT professionals, don't give DNS (the Domain Name System) the attention it deserves. As TCP/IP has become the dominant networking protocol, so has the use of DNS... Due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals don't spend much time worrying about it. This can be a huge mistake! more»

CircleID's Top 10 Posts of 2013

Here we are with CircleID's annual roundup of top ten most popular posts featured during 2013 (based on overall readership). Congratulations to all the participants whose posts reached top readership and best wishes to the entire community for 2014. more»

Identify DDoS Attacks with External Performance Monitoring (Part 2 of 3)

In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more»

Identify DDoS Attacks with Monitoring of Internal Applications (Part 1 of 3)

Most cloud DDoS mitigation services are offered on demand meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out -- quickly -- that it is under attack? Sometimes it is difficult to know. In this three part series, we will examine multiple monitoring tools companies can use to capture DDoS, which can help determine whether you are under a DDoS attack. more»

Tips to Protect eCommerce Website Availability and Security During the Holidays

With the holiday shopping season quickly approaching, Internet retailers are gearing up for an onslaught of Web traffic - which is great, as long as they have the right measures in place to keep their customers safe and satisfied. Even one hour of downtime due to a website outage or a malicious attack can have significant impact on a retailer's reputation and revenue, especially during the holidays, a time which the National Retail Federation says can add up to 40 percent of an online retailer's annual revenue. more»

A Question of DNS Protocols

One of the most prominent denial of service attacks in recent months was one that occurred in March 2013 between Cloudflare and Spamhaus... How did the attackers generate such massive volumes of attack traffic? The answer lies in the Domain Name System (DNS). The attackers asked about domain names, and the DNS system answered. Something we all do all of the time of the Internet. So how can a conventional activity of translating a domain name into an IP address be turned into a massive attack? more»

The World of Internet Threats Is Constantly Changing

The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more»

5 Steps to Prepare for a DDOS Attack

As more people are realizing that in today's cyber climate Distributed Denial of Service (DDoS) attacks are a matter of when, not if, the most common question I get asked is "What can I do to prepare?" I like to break it down into 5 key steps enterprises can take now to be prepared for a future attack... It would take a book to cover all of these topics in depth. Hopefully this will at least give you, some things to think about and plan for with your DDoS mitigation strategy. more»

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more»

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 1

Many cyber attacks against companies today go unreported, and more still are undetected... Timing and context are everything. The faster a company identifies a problem, and the faster and deeper it is understood and its relevance to the business, the more effectively the company can respond. We call this squeezing the cyber response curve. This two-part post will discuss the current state of cyber threats, what the cyber response curve is and its impact your organization and how you can effectively squeeze this curve to improve attack response. more»

What Smaller Institutions Can Learn from DDoS Attacks on Big Banks

Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. JPMorgan Chase, Wells Fargo and PNC were among the first to sustain intermittent damage. Eventually, the top 50 institutions found themselves in the crosshairs... In the months to come, security experts would praise the banks' collective response, from heightened DDoS protection to candid customer communications.. these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks. more»

Breaking Down Silos Doesn't Come Easy

"We need to break down silos", is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but also an EU driven event like ICT 2013 have "Breaking down silos" and "Building bridges" on the agenda. But what does it mean? And how to do so? more»

News Briefs

Indonesia's Largest Telecom Provider Leaks Large Portions of the Global Routing Table

US Government Releases Cybersecurity Framework Proposal

Live Data Visualization of DDoS Attacks

Google Launches 'Project Shield': Anti-DDoS Service to Protect Free Expression Online

DDoS Awareness Day - Oct 23, Register Today for Live Virtual Event

Arrest Made in Connection to Spamhaus DDoS Case

U.S. CERT Issues Alert on DNS Amplification Attacks

Largest DDoS Attack To Date Aimed at Spamhaus Effects Global Internet Traffic

DDoS Attacks on US Banks This Week Peaked at 60 Gbps

DDoS Attacks Increased by 2000% in Past 3 Years, Asia Generating Over Half of Recent Attacks

Feds Shut Down File-Sharing Website Megaupload.com, Seven People Charged

South Korean Ruling Party Chief Offers Resignation Amidst DDoS Scandal

FBI Warns of Cyberattacks Against Banks - Aided by Variant of Zeus Trojan Called 'Gameover'

Report on Today's State of DNS Services

CAUCE Director Neil Schwartzman Wins Prestigious MAAWG Award

DDoS Attack Size Breaks 100 Gbps for First Time, Up 1000% Since 2005

Myanmar Internet Down from Massive DDoS Attack

IPv6 Posing New Security Issues

DNS Survey Results Pandora's Box of Both Frightening and Hopeful Results, Says Cricket Liu

Consumer Modems Worsening DNS Problem Linked to DDoS Attacks

Most Viewed

Most Commented

Neustar Updates – Sponsor

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

dotStrategy, Co. the operator of the new Top Level Domain .BUZZ, announced today it has selected Neustar's Registry Threat Mitigation Services to support and protect the .BUZZ registry. ›››

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. ›››

Why Managed DNS Means Secure DNS

The current DNS protocol, "if my packets don't get through I'll just retransmit them and they're not critical" will no longer cut it in today's ever-changing security landscape. ›››

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

DDoS attacks have continuously been on the rise and as you may have heard plenty already, more and more attackers are targeting DNS. In the following video, Rodney Joffe, Neustar's Senior Vice-President and Technologist, explain how hardened DNS can keep your business safe. ›››

DDoS Attacks in the United Kingdom: 2012 Annual Trends and Impact Survey

In both 2011 and 2012, Neustar reported on the DDoS attack landscape in North America. This year, it also surveyed IT pros in the United Kingdom on the growth of attacks and their impact in 2012, as well as the types of DDoS protection organizations use. ›››

Neustar Launches Global Partner Program

Neustar has launched a new program to allow partners to resell Neustar's cloud-based infrastructure services, including managed DNS and DDoS protection offerings, to their online customers. ›››

Hope is Not a Strategy: Neustar Releases 2012 Annual DDoS Attack and Impact Survey

The data reported here is from a wide-ranging survey, not from Neustar's network monitoring or DDoS mitigation efforts. The data reflects the realities faced by diverse IT professionals across numerous industries, among companies large and small. ›››

Industry Updates

Participants – Random Selection