ddos   3498

« earlier    

More FCC malfeasance
Lies about DDOS are now being walked back. IT chief David Bray is made out to be the villain in this telling
fcc  ddos  lies  government  politics  corruption 
14 days ago by nelson
Federal agency directly lied to journalists
fcc  ddos  corruption  politics  netneutrality  ajitpai  davidbray  markwigfield 
16 days ago by nelson
All you need to know about SYN floods
Deep dive into the Linux kernel on how SYN cookies work, and which turntables to turn in case of SYN floods issues.

"Also fixing the SYN flooding problem requires you to modify net.ipv4.tcp_max_syn_backlog, net.core.somaxconn and the backlog size passed to the listen() syscall."
networking  linux  ddos 
28 days ago by orange
SYN Flood Mitigation with synsanity
A small and nice overview of what SYN floods and SYN cookies are.
Github also present their solution to the problem - synsanity, which basically emulates the behavior of the kernel in the netfilter stack instead of the TCP stack, improving the performance of generating SYN cookies by avoiding some locks.
networking  ddos 
28 days ago by orange
How to mitigate DDoS using Rack::Attack | BigBinary Blog
Recently, we faced a DDoS attack in one of the clients’ projects. There were many requests from different IPs to root and login paths, and we were running thrice the usual number of servers to keep the system alive. We had to throttle requests based on different parameters and the gem Rack::Attack helped us with that.
rack  howto  ddos  web  security  programming 
5 weeks ago by schmlblk
February 28th DDoS Incident Report | GitHub Engineering
Cloudflare described an amplification vector using memcached over UDP in their blog post this week, “Memcrashed - Major amplification attacks from UDP port 11211”. The attack works by abusing memcached instances that are inadvertently accessible on the public internet with UDP support enabled.
ddos  github  memcache  cybersecurity 
6 weeks ago by bwiese
Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323K — Krebs on Security
These 24,000 Mirai devices clobbered my site for several days with data blasts of up to 620 Gbps. The attack was so bad that my pro-bono DDoS protection provider at the time — Akamai — had to let me go because the data firehose pointed at my site was starting to cause real pain for their paying customers. Akamai later estimated that the cost of maintaining protection against my site in the face of that onslaught would have run into the millions of dollars.
mirai  iot  ddos  cybersecurity  krebsonsecurity 
6 weeks ago by bwiese

« earlier    

related tags

'biggest-ever'  -  a  administration  ajitpai  akamai  amplification  and  anti  apache  arbor  archive  argon2  arstechnica  attack?  attack  brace  broadband  browser  bug  can  cloud  cloudflare  code  commitstrip  comp3911  con…  corruption  cyberattacks  cybercrime  cybersecurity  davidbray  ddosmon  demo  detection  devops  digital  dns  does  dos  edtech  experts  exploit  fcc  first  for  from:flipboard  from:ifttt  github  golang  google  government  hacking  hashing  hokusai  how  howto  https://shinyobjectreviews.com/vpn-proxy/nordvpn-anti-ddos/  human  ifttt  important  in  infrastructure  internet  iot  ip_spoofing  isc  jm  krebsonsecurity  lies  linux  malware  many  marketing  markwigfield  memcache  memcached  memcrashed  mirai  mod  monitoring  more  netneutrality  netscout  network  networking  news  nginx  nord  nordvpn  ntp  object  of  offer  ohforfuckssake  on  ops  otf  password  pdf  performance  personal_net  pinterest  pocket  politics  postmortems  presentation  programming  prolexic  protection  protonmail  proxy  qtr  rack  rails  readitlater  reference  reliability  review  reviews  say  script  security  service  shiny  shodan  snmp  so!  so  specialized  sqli  sre  stop  strangeloop  sysadmin  tbpsddos  technology  the  this  threatpost  throttling  tns  true  typescript  udp  vpn  waf  wake  web-server  web  winning  wired  wordpress  work?  |     

Copy this bookmark: