Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Denial-of-service attack
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Advanced persistent DoS=== An '''advanced persistent DoS''' (APDoS) is associated with an [[advanced persistent threat]] and requires specialized [[DDoS mitigation]].<ref name=":0">{{Cite book|title=Cyberwarfare Sourcebook|last=Kiyuna and Conyers|year=2015|publisher=Lulu.com |isbn=978-1329063945}}</ref> These attacks can persist for weeks; the longest continuous period noted so far lasted 38 days. This attack involved approximately 50+ petabits (50,000+ terabits) of malicious traffic.<ref>{{cite news |last1=Ilascu |first1=Ionut |title=38-Day Long DDoS Siege Amounts to Over 50 Petabits in Bad Traffic |url=https://news.softpedia.com/news/38-Day-Long-DDoS-Siege-Amounts-to-Over-50-Petabits-in-Bad-Traffic-455722.shtml |access-date=29 July 2018 |agency=Softpedia News |date=Aug 21, 2014}}</ref> Attackers in this scenario may tactically switch between several targets to create a diversion to evade defensive DDoS countermeasures but all the while eventually concentrating the main thrust of the attack onto a single victim. In this scenario, attackers with continuous access to several very powerful network resources are capable of sustaining a prolonged campaign generating enormous levels of unamplified DDoS traffic. APDoS attacks are characterized by: * advanced reconnaissance (pre-attack [[open-source intelligence|OSINT]] and extensive decoyed scanning crafted to evade detection over long periods) * tactical execution (attack with both primary and secondary victims but the focus is on primary) * explicit motivation (a calculated end game/goal target) * large computing capacity (access to substantial computer power and network bandwidth) * simultaneous multi-threaded OSI layer attacks (sophisticated tools operating at layers 3 through 7) * persistence over extended periods (combining all the above into a concerted, well-managed attack across a range of targets).<ref>{{cite web|url=http://www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/367329/|archive-url=https://web.archive.org/web/20170201181833/https://www.scmagazineuk.com/video-games-company-hit-by-38-day-ddos-attack/article/541275/|archive-date=2017-02-01|title=Video games company hit by 38-day DDoS attack|last=Gold|first=Steve|date=21 August 2014|work=SC Magazine UK|access-date=4 February 2016}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)