Counting several hot spots of DDoS attacks, DDoS protection is urgent

With the rapid development of the Internet, DDoS protection has become a problem that every Internet person needs to consider. System security, network security, information dissemination security and information content security are frequently subjected to various threats, and DDoS attacks are one of the most harmful attacks. There have been many DDoS attacks in recent years, among which the following incidents have a wide impact.
  1. GitHub suffered a 1.35T DDoS network attack. The
  well-known code hosting website GitHub suffered the largest DDoS network attack in history. It attacked the GitHub platform with a traffic of 1.35 TB per second. It used a distributed denial of service (DDoS) attack. Need any botnets. In the first stage of the attack, Github's website suffered an astonishing peak of 1.35 megabits per second (Tbps), and in the second stage, Github's network monitoring system detected a peak of 400Gbps. The attack lasted more than 8 minutes, and because the attack used a lot of traffic, it was the largest DDoS attack ever seen. This shows the necessity of corresponding DDoS protection.
  2. Large area network disconnection in the United States
  In the early morning of October 22, 2016, Dynamic Network Service (Dyn), the US domain name server management agency, announced that the company suffered a large-scale DDos (Distributed Denial of Service) attack on Friday morning. Without DDoS protection, many websites cannot be accessed in the United States. According to the feedback of social network users, the inaccessible websites include Twitter, Tumblr, Amazon, Netflix, Raddit, Airbnb and other well-known websites. The disconnection incident lasted about 6 hours and caused nearly tens of billions of dollars in economic losses to the United States. What is even more frightening is that controlling more than 100,000 smart devices to launch attacks is enough to paralyze the Internet in most of the United States. One can imagine the terrible aspects of DDoS.
  3. Massive mobile devices turned into broilers
In April 2019, the Alibaba Cloud security team observed dozens of large-scale application-layer resource exhaustion DDoS attacks (application-layer CC attacks). Such attacks have some common characteristics and found that these attacks originated from a large number of users. Some malicious apps masquerading as normal apps are installed on the mobile phone, and the app launches an attack on the target website after receiving the attack command dynamically. According to monitoring data, in the past two months, more than 500,000 mobile devices have been used as attack tools by hackers, reaching the scale of a single attack source for PC broilers. It is not difficult to see that malicious apps masquerading as normal applications have turned mass mobile devices into a new generation of broilers. The black and gray products have a further escalation trend in attack methods. If there is no corresponding DDoS protection measures, the victims will suffer more and more losses.
However, with the escalation of network attacks, various DDoS protection measures have also been released, and DDoS cloud protection and other functions have gradually formed an emerging market. According to a report from the China Academy of Information and Communications Technology, by 2020, global cyber security premiums will reach nearly 10 billion U.S. dollars.
This article is reproduced from: http://www.heikesz.com/ddos1/1766.html

Guess you like

Origin blog.csdn.net/weixin_51110871/article/details/111313876