• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Hosting-new.com

Hébergement web, cloud et solutions personnalisées

  • Home
  • About

Hébergement CPanel sur SSD, offre Cloud

Un hébergement professionnel sur serveur Xeon Gold et SSD

DDoS

Thousands of French Websites Face DDoS Attacks Since Charlie Hebdo Massacre

January 15, 2015 by Admin Leave a Comment

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

Nineteen thousand French websites have been attacked since the Charlie Hebdo terrorist attacks last week, according to French military head of cyberdefense Adm. Arnaud Coustilliere.

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

The post Thousands of French Websites Face DDoS Attacks Since Charlie Hebdo Massacre appeared first on Web Hosting Talk.

Web Hosting Talk

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

Filed Under: Web Hosting News Tagged With: Attacks, Charlie, DDoS, Face, French, Hebdo, Massacre, Since, Thousands, websites

Kim “Santa” Dotcom Creates Christmas Miracle: Xbox Back Online While Playstation Struggles Following Lizard Squad DDoS Attack

December 26, 2014 by Admin Leave a Comment

It appears the hacker group Lizard Squad made good on its threat to cause Microsoft Xbox and Sony PlayStation big headaches for Christmas. The group left gamers unable to use new consoles received as gifts by orchestrating DDoS attacks on the sites. This comes after the group claimed credit for…

The post Kim “Santa” Dotcom Creates Christmas Miracle: Xbox Back Online While Playstation Struggles Following Lizard Squad DDoS Attack appeared first on Web Hosting Talk.

Web Hosting Talk

Filed Under: Web Hosting News Tagged With: attack, Back, Christmas, Creates, DDoS, dotCOM, Following, Lizard, Miracle, online, PlayStation, Santa, Squad, Struggles, Xbox

Hackers Use DNS TXT Records to Amplify DDoS Attacks: Akamai Report

November 12, 2014 by Admin Leave a Comment

Cybercriminals are using DNS TXT records in order to amplify DDoS attacks, according to a security bulletin (PDF) published on Tuesday by Akamai’s Prolexic Security Engineering and Research Team (PLXsert).

The post Hackers Use DNS TXT Records to Amplify DDoS Attacks: Akamai Report appeared first on Web Hosting Talk.

Web Hosting Talk

Filed Under: Web Hosting News Tagged With: Akamai, Amplify, Attacks, DDoS, Hackers, records, Report

Taking a Behavioral-based Approach to DDoS Security

September 24, 2014 by Admin Leave a Comment

As the proliferation of online data has grown, so too has the need for companies to develop massive and complex virtual infrastructures in order to support their online traffic. These systems offer users untold benefits in terms of front-end experience, web performance, and data storage. Yet one of the unfortunate consequences that has arisen from the development of these enormous infrastructures is their susceptibility to different forms of online attacks.

One such method of online incursions that’s being deployed more and more by attackers is through a distributed denial-of-service, or DDoS attack. Simply put, a DDoS attack involves hijacking a system’s performance capabilities by flooding it with ancillary requests and tasks. The end goal of such an attack is to tie up the system sufficiently enough to make it unable to support actual user traffic, or to slow its operations to the point of making it virtually inaccessible. Simple denial-of-service attacks involve only one attacker, while DDoS attacks typically involve multiple parties attacking a system at different access points.

Defining a DDoS Attack

The success of a DDoS attack depends largely upon the size of the system that’s being placed under siege. Given that the ultimate goal is to tie up a system’s performance, attackers tend to focus on high-profile, high-volume web servers such as those employed by financial institutions, or domain name systems servers and credit card payment processing systems. Based upon those detected as having launched such attacks, many industry insiders have come to view DDoS incursions as online protests meant to handicap organizations and destroy user confidence in their systems. Currently, it’s estimated that DDoS attacks happen at a rate of 28 attempts per hour.

DDoS attacks can be carried out in a number of different ways. These include:

  • Smurf attacks: In this attack, the attackers send out IP packets to all of the hosts on a network with a source address made to appear like that of the targeted system. This quickly eats up all of network’s available bandwidth.
  • Teardrop attacks: With this method, attackers are able to crash systems by triggering bugs in their TCP/IP fragmentation reassembly codes. Mangled IP fragments are sent with overlapping payloads, and the system often can’t support the work needed to read them.
  • Starvation attacks: Starvation attacks are considered to be asymmetrical, as an attacker uses either greater external resources (i.e., multiple attacking computers) or access to multiple properties and applications within the targeted system. Either way, the purpose is to consume the victim’s resources to the point of “starving” it out.
  • SYN floods: In a SYN flood, the attacker floods his or her target with TCP/SYN packets with forged sender addresses. The targeted server recognizes these packets as connection requests, and thus creates a half-open connection to the sender via another packet. This connection is left open awaiting a response, which never comes. Thus, the number of connection requests available on the server is tied up.
  • HTTP POST DDoS attacks: Here, an HTTP POST header is sent with a content message that specifies the size of the message that will follow. The attacker then sends the actual message at a very slow rate. Because the system recognizes the “Content-Length” field in the header, it will wait for the entire message to be received.

Other, less common attack methods have been given more ominous names like “Nuke” or “RUDY (R-U-Dead-Yet),” but the purpose of each attack method is the same:

  • Consume system bandwidth, memory, and/or processing time
  • Interrupt routing information, state information, and physical network components
  • Impede communications between legitimate users and the targeted system

Some attackers also rely on malware to try and max out processor usage, exploit errors in an operating system, create errors in sequencing and the microcode of machines, or to actually crash the targeted system completely.

Common Security Protocols

Just as with other internet security concerns, developers have been hard at work in creating programs to try and block DDoS incursions. Firewalls can be set up to include simple rules that either allow or deny system access from different ports and IP addresses. Advanced switches and routers often include rate limiting, delayed binding, and traffic shaping capabilities that can help provide system wide protection. However, these security measures are typically only capable of defending a system against simple incursion attempts. More complex DDoS attacks require advanced security systems. Some systems are in place, such as scrubbing centers or DDS based defense systems, yet these programs are often specialized and not effective at providing comprehensive protection.

A Smarter (Better?) Alternative

Recently, some forward-thinking service providers have begun to employ a smarter, behavior-based security approach that’s already being employed by certain online retailing, finance, and credit card companies to help analyze consumer spending habits. Unlike other security measures, this method follows the full cycle of the packet that a system receives, specifically the system resource that the packet is intended for, that resource’s ability to process the packet’s request, and the content of that request being sent back to the source.

This method monitors traffic by utilizing a unique algorithm which assigns a risk score to all two-way traffic being run through the system. Depending upon the resources of the targeted system application and the response time triggered by an incoming request, the algorithm can raise the risk score to the point of identifying an attack in progress and immediately trigger a drop of that high-risk traffic.

Perhaps the most attractive feature of this new behavior-based security method is that it is essentially self-learning. As new attacks are launched, the algorithm updates to include the characteristics of that attack, allowing it to recognize those features much faster in the future. This allows it to differentiate erratic from consistent traffic and recognize legitimate users from attacking programs intent on causing harm. The obvious drawback is that one is placing the security of business-critical data into the hands of a fluid, signatureless program as opposed to tuned, threshold-driven security protocols.

The threat of DDoS isn’t something that can completely be eliminated, especially given the rate at which attackers are developing new strategies such as multivector and application layer attacks designed to overcome current security protocols. Thus, the need for an intelligent “on-site” solution is needed in order to protect the performance capacity of those business applications that users consistently call upon, By employing smart, behavior-based methods of DDoS mitigation, organizations may be able to outthink their attackers, ensuring that they remain one-step ahead in the constant struggle to defend the performance capability of their systems.

Top image ©GL Stock Images

whg.banner.geeks

Related posts:

  • Is Your Server Secure? How Vulnerable Is Your Data to Hackers?
  • How Secure Is the Cloud? Will It Rain Personal Information Everywhere?
  • Can You Be Required by Law Where to Host Your Website?
  • Will Web Hosting Companies Ever Be a Target of Cyber Attack?
  • Why They Killed Aaron Swartz
  • NSA Data Collection: Is it Possible to Remain Anonymous and Still Be on the Web?
  • Green Data: Is It Catching On and How Does One Comply With “Green”?
  • Google Changes SEO: Kills Keyword Data
  • Are Cloud Providers Pushing Clients Back to Colocation?
  • Data Backup and Recovery Solutions
Zemanta

Web Hosting Geeks’ Blog

Filed Under: Web Hosting Tagged With: Approach, Behavioralbased, DDoS, Security, Taking

Right Path To Take High Protection With DDOS Protection

September 8, 2014 by Admin Leave a Comment

High server protection service is the first demand of users. You know well that in these days most work is depending on online market, that's why server speed is a basic demand of every user. The online market is the best way to get business facts and product marketing instead, it you can do more work here related to web.
Find Articles, Free Articles Directory | Web Hosting Articles

Filed Under: Web Hosting Tagged With: DDoS, high, path, Protection, Right, Take

DDoS Attack Uses WP Security Breach

August 23, 2014 by Admin Leave a Comment

WordPress pingback DDoS is back in the news, and it spells trouble for most of the popular content management system’s 100 million sites. The Return of Pingback DDoS In mid-march a popular WordPress was suddenly overwhelmed by millions of HTTP … Continue reading →

(Visited 53 times, 1 visits today)

Web Hosting UK Blog | Dedicated Servers VPS Hosting Technology Updates

Filed Under: VPS / Dedicated Servers Tagged With: attack, breach, DDoS, Security, Uses

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 5
  • Go to Next Page »

Primary Sidebar

Made with love by Hosting-New