官术网_书友最值得收藏!

Application layer attacks

Application attacks are low traffic rate attacks which are very hard to detect. These are targeted at weaknesses in an application or server with the goal of establishing a connection and exhausting processes and transactions. Such attacks do not require a botnet type army; generating a low traffic rate needs few sources and the traffic type seems to be legitimate.

The most famous example of a Layer-7 attack is the HTTP Get/Post DDoS attack.

  • HTTP Flood Attack: HTTP flood is a very common type of DDoS attack in which the cyber criminal exploits HTTP GET or POST requests to attack an online web server or application. The attacker forms a botnet army to send the targeted server a very large number of GET (image content) or POST (files) requests. The targeted web server attempts to answer each request coming from the botnet army. In accordance with normal application behavior, the server allocates the maximum number of resources to handle the requests. This prevents genuine requests coming from authentic users to reach to the web server or application. This simply turns into a denial of service:
  • Cloud is a new platform for attackers: To create a zombie botnet army cloud series provides a new platform to hackers. Thousand of VMs/hosts can be created and deleted in a few seconds and the traffic looks legitimate:
  • Mitigation: A ring-based Anycast solution offers inbuilt DDoS protection against such flood attacks. The most highly-effective mitigation mechanisms rely on a combination of traffic profiling methods, including identifying the IP reputation.
主站蜘蛛池模板: 新巴尔虎右旗| 佛教| 博爱县| 合水县| 满城县| 麻栗坡县| 怀仁县| 泰安市| 荆门市| 康马县| 平安县| 科尔| 阜宁县| 黄陵县| 铁岭县| 衢州市| 延津县| 三明市| 常熟市| 太保市| 静海县| 东乡| 旬邑县| 新化县| 新昌县| 宁河县| 祁门县| 大冶市| 庆元县| 岚皋县| 阳西县| 上思县| 灵宝市| 上栗县| 张家港市| 汉阴县| 辰溪县| 大港区| 阳谷县| 灌南县| 礼泉县|