官术网_书友最值得收藏!

Application layer attacks

Application attacks are low traffic rate attacks which are very hard to detect. These are targeted at weaknesses in an application or server with the goal of establishing a connection and exhausting processes and transactions. Such attacks do not require a botnet type army; generating a low traffic rate needs few sources and the traffic type seems to be legitimate.

The most famous example of a Layer-7 attack is the HTTP Get/Post DDoS attack.

  • HTTP Flood Attack: HTTP flood is a very common type of DDoS attack in which the cyber criminal exploits HTTP GET or POST requests to attack an online web server or application. The attacker forms a botnet army to send the targeted server a very large number of GET (image content) or POST (files) requests. The targeted web server attempts to answer each request coming from the botnet army. In accordance with normal application behavior, the server allocates the maximum number of resources to handle the requests. This prevents genuine requests coming from authentic users to reach to the web server or application. This simply turns into a denial of service:
  • Cloud is a new platform for attackers: To create a zombie botnet army cloud series provides a new platform to hackers. Thousand of VMs/hosts can be created and deleted in a few seconds and the traffic looks legitimate:
  • Mitigation: A ring-based Anycast solution offers inbuilt DDoS protection against such flood attacks. The most highly-effective mitigation mechanisms rely on a combination of traffic profiling methods, including identifying the IP reputation.
主站蜘蛛池模板: 海林市| 库车县| 久治县| 宁远县| 缙云县| 特克斯县| 阿拉善盟| 绿春县| 万荣县| 海口市| 房产| 华安县| 洛扎县| 永吉县| 巴南区| 沂水县| 新绛县| 闽侯县| 宜都市| 毕节市| 永寿县| 鹰潭市| 微山县| 社旗县| 临沧市| 兴业县| 清涧县| 靖远县| 宜兰市| 北辰区| 墨江| 顺平县| 孝义市| 南和县| 奎屯市| 阳西县| 二连浩特市| 田东县| 缙云县| 巫溪县| 历史|