| | November 201519CIOReviewIn many companies, IT professionals are confident that their equipment and backup systems are capable of coping, even with a peak load on their corporate online services. However, a DDoS attack can disrupt the operation of even the most powerful server. It can produce flows of incorrect requests, invalid responses from third-party servers interrupted client sessions and other junk information. With all of this activity, it's not only the server that could be vulnerable. When it comes to a DDoS incident, IT specialists usually spend their time and resources combating the attack--and this could be a fatal mistake. Before throwing all IT resources into resolving an attack-related problem, it is vital to understand whether it's just a DDoS attack, or in fact a smokescreen concealing something else.Usually a DDoS attack is intended to render an online resource, an online service or the entire IT infrastructure unavailable to users. Commercial companies and online government resources can be victims of these attacks and they might even come from rival companies looking to snatch a market advantage and compromise a competitor in the eyes of users. They may also be commissioned by blackmailers to extort money, or by hacktivists (hackers that use cybercrime to support political or social campaigns) attempting to "punish" an organization for political or personal reasons.Today, it's relatively cheap to commission a DDoS attack. A variety of methods and a large number of vulnerable servers enable cybercriminals to organize powerful and inexpensive DDoS attacks. After a little online research, anyone can order an attack on a web-based resource for just $50. And thanks to the use of cryptocurrencies, customers are assured that financial records will not identify them. Ease and Evgeny VigovskyWhere There's Smoke There's A DDoS AttackBy Evgeny Vigovsky, Head of Kaspersky DDoS Protection, Kaspersky LabCXO INSIGHT
<
Page 9 |
Page 11 >