main

Attack MitigationDDoS AttacksSecurity

6 Types of DDoS Protection for Your Business

July 14, 2014 — by David Monahan2

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

DDoS attacks have become commonplace these days.  The offending attackers may be hacktivists, cyber-criminals, and nation states or just about anyone else with an Internet grudge and a PayPal or Bitcoin account.  These attacks themselves often require no technical skill.  Someone with a bone to pick can simply purchase the use of any number of nodes on one or more botnets for an hourly fee (long term rate discounts available); use a Graphical User Interface (GUI) to organize the attack and then launch it.

Attack MitigationDDoS AttacksSecurity

Inside the World of Hacker Reconnaissance

March 19, 2013 — by Eyal Benishti1

The inventor of the telephone, Alexander Graham Bell once stated, "Before anything else, preparation is the key to success." Unfortunately, it appears that attackers launching DoS/DDoS attacks have embraced this line of thought and invested their efforts in reconnaissance and meticulous preparation during the "pre-attack" phase. Drawing from attacks handled by our Emergency Response Team (ERT), Radware recently conducted research on the ways in which pre-attack planning and detailed preparation dramatically increases the potency and success rate of attacks.

Application SecurityAttack MitigationDDoS AttacksHTTP Flood AttacksSecurity

Stock Exchanges in the Line of Fire

March 6, 2013 — by Ziv Gadot0

During last week’s RSA conference in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire – Morphology of Cyber Attacks." Based predominantly on my experience as part of Radware’s Emergency Response Team (ERT) that provides 24/7 DDoS attack mitigation support, I focused on three specific topics:

Attack MitigationDDoS AttacksSecurity

Security Week Article: The Need for Resource-Aware Mitigation Technology

August 21, 2012 — by Avi Chesla0

Recently, I wrote an article for Security Week on the growing need for security solutions to manage under-the-radar attack tools before they wreak long-term havoc on the network. When first hearing about another lethal DoS (denial-of-service) attack, the first thing that comes to mind is the volume of traffic attackers sent to take down a service, or to flood a victim’s network. Realizing a more “affordable” solution, attackers are now favoring techniques that require very little resources and can slowly occupy a victim’s machine until the resources are spent.

Attack MitigationDDoS AttacksHTTP Flood AttacksSecurity

ERT Threat Alert: Olympic Security Update

July 30, 2012 — by Matan Atad0

Radware’s Emergency Response Team (ERT) releases a new threat alert regarding an upcoming DDoS attack targeting websites linked to the 2012 Summer Olympics.

Attacker Background

An event with the magnitude of the Summer Olympics is a likely target for many threats, including IT security attacks.  Radware Security researchers have found that the Olympic Games website is on the radar of hackers who published an HOIC booster script on pastebin. The time or sizes of potential attacks are unknown. Additionally, we’ve identified two companies’ URLs that were found on HOIC booster scripts in the last 24 hrs. Presumably, this means that two companies could be targeted for future attacks. Others may be targeted as well.

DDoS AttacksHTTP Flood AttacksSecurity

DoS Attack Forensic: Following Sherlock Holmes Footsteps

August 2, 2011 — by Ziv Gadot0

Denial-of-Service (DoS) Attack forensics has several motivations. When under attack, this process is important to identify the attacker and safely distinguish it from legitimate traffic, and in turn to accurately employ various mitigation techniques to block it. After the attack is over, forensic is important for our customers to understand the attack origin, motivation, preparation for a second strike, and as a basis for legal actions. Our research team values forensic as a research tool that improves our understanding of the DoS attack world.