Friday, October 8, 2010

DDos remains a primary threat to a number of ISP


In addition to mostly distributed by the botnet launched denial of service attack, the experience of other types of threats are botnets and other malicious attacks, including phishing attacks, spam, identity theft.


According to the survey results, Arbor company summed up the zombie network the following trends:


1. Puppet Shepherd (botherder) has been difficult to penetrate the command and control channels on the zombie host to better control.

2. Changing the old zombie hosts, leading to new hosts and zombie botnets are emerging.

3. Zombie master hidden deeper, more organized, it is difficult to find and remove.

4. Zombie network structure more flexible, more powerful capabilities, but also good at camouflage, in order to avoid all kinds of testing and analysis.


"The current host is not easy to be detected zombie out, the reason is they are no longer used for obvious malicious attack." Arbor Networks director of network structure Craig.Labovitz commented that: "Botnets are no longer simply a large number of obvious malicious data into the network, and now their activities is like the blind spot of radar in the ISP in the same flight. This greatly increased the detection of botnets, or difficult to reduce the impact of the work. "


At the same time, Arbor Networks survey also shows some other information on:

1. Network attacks ferocity rise.

The feedback showed that many ISP, backbone network from the billions of bits of magnitude of DDoS attacks in the attack frequency and intensity of the attacks have continued to grow. Consequences caused by this reason the one hand, global growth in the number of broadband internet access, on the other hand because the network of central tendency.

2. "Zombies rule."

While firewalls, operating systems and Internet service providers are best efforts, still can not stop millions of end-system can be distributed denial of service attacks or other attacks.

3. ISP they have taken some measures to prevent malicious attacks. The lack of advanced infrastructure and means, primarily through most Internet service providers cut off all access roads leading to zombie hosts to reduce the harm of illegal attacks. In this way, the network service provider has successfully protected its own backbone network is not being distributed denial of service attacks. However, the impact of this approach may actually receive more than a denial of service attack to authorities.

4. Apart from the individual average of 40 attacks each month, the report, most of the attacks reported to law enforcement agencies are aimed at ISP's.

As the economic downturn, there has been more and more to carry out income-generating botnets as a professional person. Botnets have continued to develop as an industry.

5. ISP needed source of funds.

Network operators begin to re-interest and a focus on return on investment, but once the safety of its infrastructure, especially when botnets, ISP will be in a very difficult situation. Some ISP that they might actually be able to withstand malicious attacks to a location of the damage up to protect themselves. At the same time they think it is very difficult, unless it can secure new investment.

As the emerging network security threats, research will focus on infrastructure security issue threats to the above, including DNS attacks, and VOIP attacks.

Survey shows that half of the ISP have deployed some mechanisms to detect DNS and VOIP threats. Although there are still many bodies still in the planning stages of deploying VOIP services, but few attacks against VOIP infrastructure coverage. ISP for the emergence of new security threats become increasingly alert to keep the moment.

"The good news is that today's ISP are continuing to deploy and improve their systems against attacks," Arbor Networks chief researcher Danny McPherson said: "With new security threats are emerging, while other similar means botnet attacks continue to mature We hope that the annual report of these findings will help guide their decision-making ISP, how to protect their critical infrastructure. "






Recommended links:



Good Text Or Document Editors



AVI to iPod



Production of football Photoshop 7.0



Premier Clipboard Tools



Brief Screen Savers



3GP to MPEG



evaluation Investment Tools



Dynamic change CBA button



Tear down the horse-tert-break "AION" Legend of the strongest NPC



Samsung u600 ultra slim mobile with multimedia



Shenzhen, Hong Kong: forerunner of attitude



Log multiple Gmail accounts at the same time - Firefox extension



Gateway marrying the truth in China



HTML Component (HTML COMPONENTS) one Of the



MKV to VOB



No comments:

Post a Comment