• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

CTOvision.com

Context for the CTO, CIO, CISO and Data Scientist

  • About
    • Company
    • CTO
    • Events
    • Entertainment
    • Government
    • News
    • Tech Advice
    • Tech Careers
    • The Boardroom
    • Training and Education
    • Quotes
    • Members Only
      • Sign in
  • Tech Guide
    • CTOvision Guide To Technology
    • CTOvision Guide To The Cybersecurity Technology Marketplace
    • National Security Technology
    • Cloud Computing
    • Artificial Intelligence
    • Mobile
    • Blockchain and Cryptocurrency
    • Robots
    • Internet of Things
    • Cyber War
  • Contact Us
  • Newsletters
  • OODA LLC
Home » Cyber War » Cyber Security » DDoS Attacks: What Happened And What We Should Do About It

DDoS Attacks: What Happened And What We Should Do About It

Bob Gourley October 24, 2016

The security community has been watching the DDoS threat grow to incredible levels. DDoS attacks are up 75% over last year. Over 30% of attacks reach sustained peaks of over 10 Gbps, an amount that will swamp most every business user. Some very large attacks have gone as high as 600 Gbps, a size that is overwhelming to the largest infrastructure providers.

On 21 October 2016 one of these very large attacks occurred against Internet infrastructure provider Dyn. This resulted in outages of many highly popular sites, disrupting access to Amazon, Twitter, Reddit, Airbnb, New York times, Spotfiy, Netflix and many others. Dyn provides many advanced services to these providers including managing their DNS. Since DNS is critical to how computers find other computers, traffic to these major sites was impacted because of the Dyn DDoS attack.

The probable attack vector was compromised IoT devices controlled by malicious code called “Mirai”.  This software scans the Internet for devices that still use default passwords, and then uses common protocols like telnet to log into those devices. After doing that it is in control of the device. The code actually hardens the devices a little bit to prevent other attacks against it. From that point on the device can be used as a node in a DDoS attack.

What can be done to prevent this attack or mitigate the impact of similar attacks when they occur? We provide our thoughts here, segmented into recommendations for Home Users, Business Users and Local, State, Federal Governments.

  • About
  • Latest Posts
Connect Here
Bob Gourley
Co-Founder and CTO at OODA
Bob Gourley is the CTO and Co-Founder of the due diligence and cybersecurity consultancy OODA LLC , which publishes CTOvision.com and OODAloop.com. Bob's background is as an all source intelligence analyst and an enterprise CTO.
Connect Here
Latest posts by Bob Gourley (see all)
  • Bill Vass Presents On The Extended Cloud, AWS powers edge-to-cloud applications - March 5, 2021
  • Opportunity for companies in the national Security Space to Sponsor Defense Intelligence Memorial Foundation Event - March 2, 2021
  • Miracle on Ice: Business, Technology and National Security Leadership Lessons from the 1980 Olympics USA Hockey Team - February 24, 2021

Share this:

  • LinkedIn
  • Facebook
  • Twitter
  • Reddit
  • Email

Related

Filed Under: Cyber Security, Internet of Things, News Tagged With: Amazon

Gain Decision Advantage With Innovative Enterprise Software

Bill Vass Presents On The Extended Cloud, AWS powers edge-to-cloud applications

How Aerospike achieves fine-grained global replication

Search News: Elastic Announces Web Crawler for Elastic App Search and Support for Box in Elastic Workplace Search

Looking Good: Chainlink Promises ’10x Data’ With New ‘Off-Chain Reporting’ Overhaul

Ideas On Bitcoin vs Ethereum: Performance Growth Analysis

Crypto: The Graph Adds Support for Binance Smart Chain

Snowflake names VMware veteran Jon Robertson as APJ boss

These factors are now a bottle-neck for Chainlink

From The Point Of View of an Investor: What Is The Graph?

OK this is huge: Ethereum mining revenue breaks $1 billion for the first time in February

About Bob Gourley

Bob Gourley is the CTO and Co-Founder of the due diligence and cybersecurity consultancy OODA LLC , which publishes CTOvision.com and OODAloop.com. Bob's background is as an all source intelligence analyst and an enterprise CTO.

Primary Sidebar

Search

Hot News

Bill Vass Presents On The Extended Cloud, AWS powers edge-to-cloud applications

How Aerospike achieves fine-grained global replication

Search News: Elastic Announces Web Crawler for Elastic App Search and Support for Box in Elastic Workplace Search

Looking Good: Chainlink Promises ’10x Data’ With New ‘Off-Chain Reporting’ Overhaul

Ideas On Bitcoin vs Ethereum: Performance Growth Analysis

Crypto: The Graph Adds Support for Binance Smart Chain

Snowflake names VMware veteran Jon Robertson as APJ boss


OODAcast OODA cast

OODA

Disruptive IT finder

CTOevents

Featured Content

CTO Guide To The Business of the Internet of Things

CTO Guide To The Business of Robotics

CTO Guide To The Business of Bigdata

CTO Guide To The Business of Mobility

Learn things your competitors wish you did not know

CTO Guide To The Business of Cloud Computing

CTO Guide To The Business of Cybersecurity

CTO Guide to the Business of Artificial Intelligence

RSS CTO Events

  • An error has occurred, which probably means the feed is down. Try again later.

Footer

Free Newsletters and Tech Reports

CTOs on Facebook
CTOs on LinkedIn

CTO Events
Tech Guide

OODA LLC Technology Due Diligence
OODAloop.com

CTOVision Pro: Exclusive Content

Reports
Crucial Point LLC

Copyright © 2021 CTOvision.com·

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.