Sign up to our Newsletter
Analysis of two high-volume DDoS attacks show they’re becoming more difficult to remediate with changes to port and address strategies.
On Jan. 10, a distributed denial-of-service (DDoS) attack peaked at 500 million packets per second. Depending on precisely how you measure such things, this was likely one of the largest DDoS attacks ever — until April 30, when it was surpassed by an attack that hit 580 packets per second.
How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%
According to Imperva, the company that detected and mitigated the attacks, the January attack was a syn flood coupled with a large syn flood, each of which was launched with randomized source addresses and ports.
In a blog post, researchers at Imperva contrasted the two attacks with the 2018 Github DDoS attack — a memcached amplification attack that reached 1.35 terabits per second, most of which were in large packets with a single source port and originating service address.
Read more: Dark Reading