Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Denial-of-service attack
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Advanced persistent DoS=== An '''advanced persistent DoS''' (APDoS) is associated with an [[advanced persistent threat]] and requires specialized [[DDoS mitigation]].<ref name=":0">{{Cite book|title=Cyberwarfare Sourcebook|last=Kiyuna and Conyers|year=2015|publisher=Lulu.com |isbn=978-1329063945}}</ref> These attacks can persist for weeks; the longest continuous period noted so far lasted 38 days. This attack involved approximately 50+ petabits (50,000+ terabits) of malicious traffic.<ref>{{cite news |last1=Ilascu |first1=Ionut |title=38-Day Long DDoS Siege Amounts to Over 50 Petabits in Bad Traffic |url=https://news.softpedia.com/news/38-Day-Long-DDoS-Siege-Amounts-to-Over-50-Petabits-in-Bad-Traffic-455722.shtml |access-date=29 July 2018 |agency=Softpedia News |date=Aug 21, 2014}}</ref> Attackers in this scenario may tactically switch between several targets to create a diversion to evade defensive DDoS countermeasures but all the while eventually concentrating the main thrust of the attack onto a single victim. In this scenario, attackers with continuous access to several very powerful network resources are capable of sustaining a prolonged campaign generating enormous levels of unamplified DDoS traffic. APDoS attacks are characterized by: * advanced reconnaissance (pre-attack [[open-source intelligence|OSINT]] and extensive decoyed scanning crafted to evade detection over long periods) * tactical execution (attack with both primary and secondary victims but the focus is on primary) * explicit motivation (a calculated end game/goal target) * large computing capacity (access to substantial computer power and network bandwidth) * simultaneous multi-threaded OSI layer attacks (sophisticated tools operating at layers 3 through 7) * persistence over extended periods (combining all the above into a concerted, well-managed attack across a range of targets).<ref>{{cite web|url=http://www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/|archive-url=https://web.archive.org/web/20170201181833/https://www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/541275/|archive-date=2017-02-01|title=Video games company hit by 38-day DDoS attack|last=Gold|first=Steve|date=21 August 2014|work=SC Magazine UK|access-date=4 February 2016}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Denial-of-service attack
(section)
Add topic