Analysis of two high-volume DDoS attacks show they're becoming more difficult to remediate with changes to port and address strategies.

Dark Reading Staff, Dark Reading

May 2, 2019

1 Min Read

On Jan. 10, a distributed denial-of-service (DDoS) attack peaked at 500 million packets per second. Depending on precisely how you measure such things, this was likely one of the largest DDoS attacks ever — until April 30, when it was surpassed by an attack that hit 580 packets per second.

According to Imperva, the company that detected and mitigated the attacks, the January attack was a syn flood coupled with a large syn flood, each of which was launched with randomized source addresses and ports.

In a blog post, researchers at Imperva contrasted the two attacks with the 2018 Github DDoS attack — a memcached amplification attack that reached 1.35 terabits per second, most of which were in large packets with a single source port and originating service address.

Read more here.

INT19-Logo-HorizDates-3035.png

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights