Skip to primary content

Prime-WoW

My site, my way, no big company can change this

Prime-WoW

Main menu

  • Home
  • Discord
  • Forums
  • Games
    • 7DtD
      • 7DtD Map
      • 7DtD Official Forums
      • 7DtD Wiki
    • Minecraft
      • Survival Map
      • Vanilla Map
      • FTB Map
      • FTB Wiki
      • Download FTB Client
    • NWN
      • NWN Wiki
      • NWN Lexicon
      • NWN Vault
      • NWNX
      • NWN Info
      • Rhun Guide
    • Terraria
      • Terraria Map
    • WoW
      • Prime-WoW Site
      • WoW Armory
  • Unfiltered RSS
    • Bikes
    • Games
      • Kotaku
      • PS4 News
      • VR
    • Nature
      • TreeHugger
      • Survival
    • Technology
      • Hardware
        • Hot Hardware
      • Linux
        • Linux Today
        • LWN.net
        • LXer
        • Phoronix
        • RPi
      • LifeHacker
      • Akihabara News
      • AnandTech
      • Ars Technica
      • Engadget
      • Gear & Gadgets
      • Geekologie
      • Gizmodo
      • [H]ardOCP
      • io9
      • Slashdot
      • TG Daily

Post navigation

← Previous Next →

~4,300 publicly reachable servers are posing a new DDoS hazard to the Internet

Posted on March 17, 2021 by Xordac Prime
Stylized illustration of a hooded figure at a laptop.

Enlarge (credit: Getty Images)

Criminals are upping the potency of distributed denial-of-service attacks with a technique that abuses a widely used Internet protocol that drastically increases the amount of junk traffic directed at targeted servers.

DDoSes are attacks that flood a website or server with more data than it can handle. The result is a denial of service to people trying to connect to the service. As DDoS-mitigation services develop protections that allow targets to withstand ever-larger torrents of traffic, the criminals respond with new ways to make the most of their limited bandwidth.

Getting amped up

In so-called amplification attacks, DDoSers send requests of relatively small data sizes to certain types of intermediary servers. The intermediaries then send the targets responses that are tens, hundreds, or thousands of times bigger. The redirection works because the requests replace the IP address of the attacker with the address of the server being targeted.

Read 11 remaining paragraphs | Comments



Source: Ars Technica – ~4,300 publicly reachable servers are posing a new DDoS hazard to the Internet

This entry was posted in Ars Technica, Unfiltered RSS and tagged Ars Technica by Xordac Prime. Bookmark the permalink.
Proudly powered by WordPress