Service exhaustion floods — HTTP/HTTPS flood, HTTP pipelining, and SSL renegotiation DDoS attack
Guest Post: Learn about three different types of DDoS attacks and how to defend against them.
Guest Post: Learn about three different types of DDoS attacks and how to defend against them.
Guest Post: ACC-Turbo is an open-source, pulse-wave DDoS defence system that runs at line rate, on programmable switches.
Guest Post: Cybercriminals now see home routers as gateways to corporate networks, and companies as potential attack vectors.
Guest Post: More popular websites are more likely to make changes to their name server records following a DDoS attack on their cloud provider.
Guest Post: New routing method uses bandwidth reservations, improving speed and security to meet service-level objectives.
Guest Post: Researchers propose a mechanism for DNS servers to independently determine a client’s preferred protocol.
Guest Post: An overlooked DNS vulnerability that, when combined with a configuration error, is leading to massive DNS traffic surges.
APNIC staff presented on IPv6, and DDoS prevention at KHNOG 3, held online on 4 December 2021.
Guest Post: How resilient are LEO satellite networks to DDoS attacks?
Guest Post: Simulating a DDoS attack, Japanese researchers tested a full-service resolver configured with both fetch-limit and serve-stale enabled.