欢迎来到天天文库
浏览记录
ID:40104653
大小:5.65 MB
页数:10页
时间:2019-07-21
《the-new-ddos-battleground-white-paper-final》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、AnNCCGrouppublicationApplicationLayerAttacks–TheNewDDoSBattlegroundPreparedby:AkhileshMathurPaulVlissidis1©Copyright2014NCCGroupTableofcontentsManagementSummary................................................................................................3Cu
2、rrentThreatLandscape...........................................................................................4ApplicationLayerAttacks.............................................................................................5MitigationEffectiveness.......
3、........................................................................................6DDoSAssuredTestFindings.......................................................................................7Conclusions................................................
4、.................................................................92©Copyright2014NCCGroupManagementsummaryDistributeddenialofservice(DDoS)attacks,whicharedesignedtofloodorganisations’serverspreventingsitesfromfunctioningefficientlyoratall,havebecomeincreasing
5、lymoresophisticatedandtargetedintheapproachemployedtobypasscurrentdefences.Ittakesanaverageof10hoursDespitetheireaseofexecutionbycyberbeforeacompanycanevenbegintoresolveaDDoSattackmiscreants,thefalloutfromasuccessfulDDoSattackcanbesignificant.Theshort-termeff
6、ectsareclear-customerservicedisruptionandonlinerevenueloss–butthelingeringimpactcanaffectshareprice,companyreputationandcustomerretention.DDoSattackshavebeenontheupforanumberofyearswhichresultedinsignificantincreasesinthevarietyandavailabilityofmitigationserv
7、icesdesignedtodealwithsuchthreats.Inresponsetothis,aswellastheincreasingreliancebusinesseshaveon24/7onlinepresence,theDDoSthreatlandscapehasevolvedwithmorenoticeableshiftfrombasicnetworklevelfloodingtohighlytargetedwebapplicationattacks.Withadvancementsinatta
8、cktechniquescomestherequirementformitigationproviderstoadaptdetectionandscrubbingmethodologies.Weseeaninevitablefutureshifttowardsattackvectorswhichwillbeincreasinglyproblematicforcurrent
此文档下载收益归作者所有
点击更多查看相关文章~~