tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Cloud Computing, Exchange 2013

Current Articles | RSS Feed RSS Feed

IT Support: 3 Trends in DDoS Attacks

 

DDoS Attacks and IT SecurityDistributed denial of service attacks, better known as DDoS attacks, are nothing new; but as businesses and other organizations become increasingly dependent on internet-based services such as cloud computing, they have the potential to be more disruptive than ever before.  Firms that want to remain fully secured in the existing threat environment need to stay up-to-date with the trends that are currently transforming the world of DDoS.

1. Tracing Difficulties

As technology evolves, DDoS attacks are becoming more and more difficult to trace.  Attacks can originate from any place in the world, though the majority of them are generated in just a few nations, including the United States, Ukraine, China, and India.  Techniques for spoofing IP addresses mean that it can be difficult to know for certain where an attack originated.  Businesses using a managed programs approach have an advantage in this area because they can make sure that advanced IP tools are in place and kept up-to-date.  These can help to cut through the veil of obscurity that spoofing creates.

2. Stronger Attacks

Another trend concerns the size of the attacks being reported.  More than 10% of DDoS attacks reported during the past year used enough resources to lead to an outage rapidly as the target's available bandwidth was consumed.

3. High PPS Attacks

In 2011, there was a strong rise in attacks that used a high PPS (packets per second) rate.  These are different from the traditional DDoS attack in that they drain away CPU processing power rather than simply consuming all available bandwidth.

A managed programs model for IT support is one excellent way to stay secured against a variety of threats including DDoS attacks.

your-ultimate-guide-to-choosing-the-righ

Comments

Currently, there are no comments. Be the first to post one!
Post Comment
Name
 *
Email
 *
Website (optional)
Comment
 *

Allowed tags: <a> link, <b> bold, <i> italics