Weaponizing middleboxes for TCP reflected amplification
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Geoff shares his thoughts on what was being discussed the recent OARConline 35a.
Guest Post: Capturing DDoS characteristics with the Dissector.
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Guest Post: How can we identify and locate IoT devices in networks to mitigate exposure to large-scale attacks?
Guest Post: Study investigates booter-based DDoS attacks in the wild and the impact of an FBI takedown.
Beating IoT botnets means spotting them first — graph theory research can help.
Guest Post: Study analyzes the efficiency of RTBH as a mitigation tool at one of the world’s largest IXPs.
Last year’s DDoS attacks on Cambodia’s ISPs have been a wake up call to the industry.
Guest Post: Steinthor Bjarnason concludes a three-part series on DDoS attacks, focusing on blocking well-known attack vectors and using realtime monitoring.