DDoS attacks continue to grow in frequency, intensity, and sophistication. However, the delivery method of using infected botnets and vulnerable servers to perform crushing attacks on a massive scale has not changed. Unlike other cyber attacks, where attackers leverage obfuscation to prevent detection, the loud distributed nature of DDoS attacks creates opportunities for defenders to take a proactive approach by focusing on the weapon’s location.
Attackers leverage vulnerabilities in the UDP protocol to spoof the target’s IP address and exploit vulnerabilities in servers that initiate a reflected response. This strategy amplifies the attack by producing server responses that are much larger than the initial requests.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | A10 Networks |
Published: | July 1, 2020 |
License: | Copyrighted |
Copyright: | © 2020 A10 Networks, Inc. All rights reserved. |