SSL attacks mitigated ddos attacks

Volumetric attacks, which are believed to comprise more than 50 percent of attacks launched, are focused on filling up a victim's network bandwidth. Among the most common volumetric attacks are User Datagram Protocol (UDP) flood attacks, where an attacker sends a large number of UDP packets to random ports on a remote host. UDP floods accounted for approximately 75 percent of DDoS attacks in the last quarter of 2015, according to the Versign DDoS Trends Report.

“They aren’t” is an acceptable answer for some. Not all organizations need it. However, if your organization relies on SSL-based traffic and transactions, it’s critical to understand if and how your service provider supports this capability.

Be certain that the provider’s SSL attack mitigation solution supports in-line decryption and re-encryption of traffic so data stays on your network with your security policies intact. If the SSL attack mitigation is offloaded to another network, just make sure the decryption and re-encryption process performed by your provider meets your security and service level goals.

There are hundreds of questions that you can (and should) ask your organization or DDoS mitigation provider. We hope these five serve you well in beginning those conversations.

A common form of UDP flood attack relies on reflection and amplification. UDP is a connectionless protocol (that is, it doesn't require that the two ends of a conversation establish a connection before exchanging data). An attacker can therefore forge UDP packets with fake source addresses, and use those packets to generate reply traffic. By setting the source of the UDP packets to be the IP address of the intended victim, and then sending those packets to various servers for UDP-based applications, the attacker will cause the servers to send reply traffic to the forged source IP address--the victim. This reply traffic is the "reflection" part of the attack. It's a lot like calling every pizza place in your county, and ordering a lot of pizzas to be delivered to someone you really don't like.

More Info: ddos attacks

Comments

  1. SSL gives security against trifling traffic checking on open WiFi associations (free hotspots, inns and so on without WPA encryption), ecommerce web development company dubai where different clients can fundamentally observe anything you do (exchanges, passwords and so forth.)

    ReplyDelete

Post a Comment

Popular posts from this blog

Tech Industry Takes the Lead in Redefining Work

CompTIA A+ 220-1001 and A+ 220-1002 exam

Questions a+ certification