Tuesday, December 5, 2023
  • Landing Page
  • Shop
  • Contact
  • Buy JNews
Thetimesproject
Advertisement
  • Home
No Result
View All Result
Thetimesproject
  • Home
No Result
View All Result
Thetimesproject
No Result
View All Result
Home technology

Can CDNs Work As A Way Of Weaponizing DDoS Attacks?

admin by admin
January 19, 2023
in technology
0
Can CDNs Work As A Way Of Weaponizing DDoS Attacks

Can CDNs Work As A Way Of Weaponizing DDoS Attacks

585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter
0 0

You might also like

Y6lktszld8s: The Latest Trend in Technology and Innovation

What is Error Report in Family tree maker?

Get America US Visa for Estonia country citizen’s

Read Time:3 Minute, 40 Second

Content Delivery Networks (CDNs) of various kinds have been reviewed by cyber security experts from a wide array of perspectives, especially how hackers used them as weapons and instruments of DDoS attacks to the way bad actors used free services to make herculean billing issues.

Content Delivery Networks have often been used to hurt Application Program Interfaces (APIs) as well as conduct web reflector attacks that plague the internet through bots and scrapers. Almost 60% of the internet is because of such abuse of internet resources.

Those who were to reflect on such an idea would start questioning the notion of a CDN protecting them. At one time, a CDN was never deemed worthy of protection until now. Then again, they have loopholes and we will check them in detail.

Can CDNs be really problematic?

At numerous cyber security conferences, researchers indicated and demonstrated how easy it was to bypass security in older versions of most content delivery networks (CDNs). One of those attacks is demonstrated by simply uploading an avatar to a forum, one user can easily unveil the IP of the origin servers of that forum.

Another attack exhibited the way a fake DMCA takedown worked. Once the content was removed from a website at the request of the site/content’s owner, such an attack forced either the ISP or Cloud service providers to reveal the origin server.

The methods and practices of Hackers have now evolved. They now have changed their methods to use the target’s defense systems as a weapon of attack and choice.

Firsthand knowledge from response teams of most cyber and technology firms who have dealt with such attacks before revealed that there is a trend. Attackers are using security tools to weaponize them in carrying out DDoS attacks.

There are data centers that use Netflow sampling in the detection of impending attacks. Here, samples out of each 10,000 request a client-server receives is analyzed. Once an attack is detected, either the cloud or CDN provider can divert the traffic to a mitigation center present on the network.

Through such an approach, attackers can hence detect that the path to their network is no longer 10 clicks away. Theoretically, it might only be approximately 15 clicks away. Once the path has been decided or changed, attackers can hence spoof the server’s IP and send in corrupt data packets to the server directly. Hence, they avert the mitigation tools based on traffic flow.

Essentially, the defense mechanisms hence become part of the weapon that is supposed to prevent the attacks from happening.

What do renowned cybersecurity firms have to say in this matter?

Numerous cyber security firms of good repute have seen such attacks happen numerous times and at times, it is quite difficult for service providers to determine if their tools are part of the problem. Even on the best of defense and DDoS Protection Service systems, it can cause issues and wreak havoc.

What can CDN providers do to counter this threat?

As an effort of combining resources to improve defenses, some CDN providers have implemented open-source tools in their networks. Here are some things to be aware of and professionals can ask questions regarding this approach.

Let us consider the implementation of a new rule. How long does it take for a new rule to be implemented into a particular configuration? Some providers have a service level agreement (SLA) of about 30 minutes. Others may have SLA going up to 24 hours.

Hackers do not limit their creativity. There is a group known as the Lizard Squad and they claim to have both hacked and controlled more than 250,000 home routers (a quarter of a million and this is quite a number!).

Suppose Clients would ask their CDN service providers to ask to block those infected routers. That would mean catastrophe because half of them might actually be customers. Similarly, how many of them are even real? If the defense is based on IP blocklists then companies could be potentially blocking their own clientele. This can lead to quite a conundrum.

If in case, such a thing even happens, can a cloud or CDN be able to detect and differentiate whether or not the requests coming through is a question that can really undermine and question the efforts of cyber security teams and the kind of CDNs deployed?

Share

Facebook
Twitter
Pinterest
LinkedIn

About Post Author

admin

I am Wajhat Ali (Zain Ali ) I am admin of 4 blog sites . URL Filmdailyweb.com Thetimesproject.com Techinbullion.com Businessbuzzfire.com For details Contact wajhatali1231@gmail.com
admin@thetimesproject.com
https://thetimesproject.com
Happy
Happy
0 0 %
Sad
Sad
0 0 %
Excited
Excited
0 0 %
Sleepy
Sleepy
0 0 %
Angry
Angry
0 0 %
Surprise
Surprise
0 0 %
Tags: Anti DDoSanti ddos protectioncdn waf
Previous Post

Digitizing Services for Embroidery For Your Business

Next Post

Barium Titanate Market Size, Share, Report, Price, Trends, Outlook, Key Players and Forecast Period 2021-2026

admin

admin

I am Wajhat Ali (Zain Ali ) I am admin of 4 blog sites . URL Filmdailyweb.com Thetimesproject.com Techinbullion.com Businessbuzzfire.com For details Contact wajhatali1231@gmail.com

Related Posts

Y6lktszld8s: The Latest Trend in Technology and Innovation
technology

Y6lktszld8s: The Latest Trend in Technology and Innovation

by admin
April 12, 2023
What is Error Report in Family tree maker?
Software

What is Error Report in Family tree maker?

by admin
January 22, 2023
How To Enjoy The Formula One Racing With Butina Boats In Ab Dhabi
technology

Get America US Visa for Estonia country citizen’s

by admin
January 22, 2023
The best price-quality ratio
technology

The best Xiaomi cell phones of 2023: The best price-quality ratio

by admin
January 22, 2023
Xiaomi Redmi Note 11, analysis: the one who does not risk it in 2023!
technology

Xiaomi Redmi Note 11, analysis: the one who does not risk it in 2023!

by admin
January 21, 2023
Next Post
emr

Barium Titanate Market Size, Share, Report, Price, Trends, Outlook, Key Players and Forecast Period 2021-2026

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%
(Add your review)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

gojek clone app script

How To Uplift Your On-demand Multi-services Business Launching Gojek Clone App?

January 20, 2023
visa consultant in chandigarh for canada

KNOW ALL ABOUT CANADA VISA FOR UNITED KINGDOM CITIZEN’s

January 6, 2023

Categories

  • Automotive
  • Business
  • Computer
  • Digital Marketing
  • Education
  • Entertainment
  • faishon
  • Fashion
  • Featured
  • Finance
  • Food
  • Games
  • Health
  • Home Improvement
  • Life Style
  • Lifestyle
  • management
  • Music
  • news
  • services
  • Software
  • Sports
  • tech
  • technology
  • Travel
  • Uncategorized
  • Website Reviews

Don't miss it

Restaurant
Food

Quick Tips to Revamp Your Restaurant

December 5, 2023
Debunking The Common Misconceptions About Optimum Fiber Net
Business

Debunking The Common Misconceptions About Optimum Fiber Net

November 30, 2023
Brokerage
Software

Energize Your Brokerage with Cutting-Edge Software Solutions

November 28, 2023
Money
Business

How You Can Get the Most Out Of Your Money

October 31, 2023
Score Big Discounts with These Exclusive Coupon Codes
Entertainment

Score Big Discounts with These Exclusive Coupon Codes

October 13, 2023
Dental Crowns vs. Veneers: Which Is Right for You?
Health

Dental Crowns vs. Veneers: Which Is Right for You?

September 8, 2023
Thetimesproject

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Learn more

Thetimesproject.com

No Result
View All Result
  • Home

Thetimesproject.com