Underestimated Application Layer DDoS Attacks

B2B Cyber ​​Security ShortNews

Share post

With the rise of remote working, many companies are turning to network architectures that allow data to be processed and stored closer to the data source. DDoS attacks on the application layer are often underestimated.

Although much attention has been paid to mitigating network distributed denial-of-service (DDoS) attacks, it is crucial to also address application layer DDoS attacks, which can be of particular interest to attackers.

“While DDoS attacks are well known, they should not be dismissed as the norm in the current attack landscape. Cybercriminals use the results of their DDoS attacks at the application layer to gain insights and refine their attack methodology. Companies should therefore pay particular attention to three DDoS attacks at the application layer and expand their protection accordingly:

A Slowloris attack uses partial HTTP requests to open connections between a single computer and an attacked web server. The goal is to keep these connections open for as long as possible to overload and slow down the target.

Slow Post DDoS attack

In a Slow Post DDoS attack, the attacker sends legitimate HTTP Post headers to a web server. The sizes of the subsequent message text are correctly specified in the headers. However, the message text is sent at a painfully slow rate - sometimes as little as one byte every two minutes. Since the message is processed normally, the attacked server will do its best to follow the specified protocol rules, resulting in slow server progress afterwards.

TCP state exhaustion attacks attempt to overload the connection tables present in many infrastructure components, including load balancers, firewalls, and application servers themselves. Even high-capacity devices that can maintain the state of millions of connections can be brought down by these attacks ", says Christian Syrbe, Chief Solution Architect at NETSCOUT.

More at Netscout.com

 


About NETSCOUT

NETSCOUT SYSTEMS, INC. helps secure digital business services against security, availability and service disruptions. Our market and technology leadership is based on the combination of our patented smart data technology with intelligent analytics. We provide the comprehensive, real-time insight that customers need to accelerate and secure their digital transformation. Our advanced Omnis® cybersecurity platform for threat detection and mitigation offers comprehensive network visibility, threat detection, contextual investigations and automated mitigation at the network edge.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more