Email Alerts
-
Web application attacks security guide: Preventing attacks and flaws
This Web application attacks guide explains how Web application attacks occur, identifies Web application attack types, and provides Web application security tools and tactics to protect against them. Learning Guide
-
Quiz: Securing your network
Test your knowledge of network security. Quiz
-
Radware's Ron Meyran discusses DoS attack tools, planning, execution
Ron Meyran, Radware's director of security solutions, answers our questions about DoS attack planning and execution. News | 06 Aug 2013
-
DDoS attack trends highlight increasing sophistication, larger size
Though the Spamhaus DDoS attack showed the potential devastation of increasing bandwidth, DDoS attack trends show DDoS type to be just as important. News | 15 May 2013
-
Activists unleash biggest DDoS cyber attack to date
Activists unleash a distributed denial-of-service (DDoS) attack in support of a web hosting firm, Cyberbunker, blacklisted by an anti-spam website cyber security | 28 Mar 2013
-
Some activist DDoS attacks growing in sophistication, expert says
Most distributed denial-of-service attacks are easily filtered out, but individuals with the technical skills can mirror legitimate traffic. News | 27 Sep 2012
-
GoDaddy back online, affirms no data comprised
GoDaddy CEO Scott Wagner said the disruption was caused by an internal network glitch. News | 11 Sep 2012
-
GoDaddy investigates service disruption
GoDaddy said it was working to restore service. A person claiming to be a member of Anonymous has claimed responsibility. News | 10 Sep 2012
-
DDoS mitigation a key component in network security
With DDoS attacks increasing in frequency, size and complexity, it’s time for online businesses to start protecting themselves. News | 02 Jul 2012
-
Arbor Networks warns of IP-Killer, MP-DDoser DDoS tool
Arbor Networks researchers found robust capabilities in the MP-DDoser/IP-Killer tool used to conduct powerful distributed denial-of-service attacks. News | 08 Jun 2012
-
DDoS attacks growing in size, break attack bandwidth barrier, Arbor Networks says
Attackers are becoming more skilled at harvesting the amount of bandwidth available and selecting specific targets, a new report finds. Article | 07 Feb 2011
-
DDoS mitigation expert predicts more serious application-layer attacks
The WikiLeaks "hacktivist" DDoS attacks pale in sophistication to the more serious application-layer DDoS threats of the future. Article | 17 Dec 2010
- See more News on Denial of Service (DoS) Attack Prevention-Detection and Analysis
-
Mega-DDoS attack prevention: How to prepare for larger DDoS attacks
Enterprises face increasing risks from mega-DDoS attacks. Expert Brad Casey provides advice on high-bandwidth DDoS attack prevention. Tip
-
DoS attack responses demand better business continuity plans
Expert Nick Lewis says an effective DoS attack responses demand better business continuity plans, including pre-negotiating with providers. Tip
-
Server Message Block Version 2 security in question: Disable or patch?
Nick Lewis reviews the recent vulnerability discovered in a popular Windows file-sharing and printing protocol. Yes, there's a patch, but should you deploy it, or simply disable SMBv2? Tip
-
Avoiding the scourge of DNS amplification attacks
DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization. Tip
-
How to recover your network after a security breach
For SMBs that don't have a budget to invest in a full-scale network management system, recovering from a security breach requires more work from the IT staff than just pressing a few buttons. In this tip, Tom Lancaster pinpoints the five most importa... Tip
-
Achieving network security with tomorrow's antivirus tools
Learn about antivirus from an intelligence/technology perspective and offers best practices for simple file-type blocking, and the implementation of heuristic- and reputation-based antivirus tools. Tip
-
The key technologies in a network perimeter intrusion defense strategy
This article lays the groundwork for future discussions of intrusion defense. Joel Snyder introduces technologies that act as strong network perimeter defenses. Tip
-
Block and reroute denial-of-service attacks
Prevent denial-of-service and distributed denial-of-service attacks from taking down your network by blocking and rerouting DDoS and DoS traffic using honeypots, subnets and intrusion detection and prevention systems. Tip
-
Beat back the botnets
Learn what botnets are, how hackers create them and what you can do to protect your network against them. Tip
-
When's 'denial-of-service' a good thing?
In order to combat the increasing number of viruses and attacks, companies should consider 'denying' users of any and all applications that aren't absolutely essential. Tip
- See more Tips on Denial of Service (DoS) Attack Prevention-Detection and Analysis
-
How enterprises can prepare for Project Blitzkrieg-style DDoS attacks
Expert Nick Lewis offers security measures that enterprises, particularly financials, can utilize to fend off Project Blitzkrieg-style DDoS attacks. Answer
-
Prevent DDoS DNS amplification attacks by securing DNS resolvers
Expert Nick Lewis details how misconfigured DNS resolvers can be used for DDoS DNS attacks and how organizations can secure them. Answer
-
Preventing a distributed denial-of-service attack: Is hardware needed?
Expert Matthew Pascucci suggests four key questions to ask yourself when developing distributed denial-of-service attack mitigation tactics. Answer
-
Cleaning a compromised server: How to detect booter shells, remnants
Expert Nick Lewis discusses the importance of fully cleaning a compromised server and how to detect and remove booter shells and other remnants. Answer
-
Is it possible to prevent DDoS attacks?
A distributed denial-of-service (DDoS) attack can consume all your network bandwidth. Learn how to prevent a DDoS attack in this expert response. Answer
-
How to stop a DoS attack against a key server
When a disgruntled former employee decides to wreak havoc on a network with a DoS attack, there are a few quick steps you can take to minimize the damage. Learn more in this expert response. Ask the Expert
-
How to defend against a sync flood attack
Nick Lewis explains how to protect your organization from sync flood attacks. Ask the Expert
-
Proxy server security: Defending against DoS and other attacks
In this expert response, find out how to boost proxy server security in the enterprise. Ask the Expert
-
How to prevent a denial-of-service (DoS) attack
While it may not be possible to fully eradicate the risk of DoS attacks from an enterprise, there are steps that infosec pros can take to prevent them. In this expert response, Mike Chapple gives pointers on how to prevent DoS attacks. Ask the Expert
-
How to prevent DDoS attacks on websites
Expert Mike Chapple reviews actions that you can take to protect yourself against large-scale DDoS attacks. Ask the Expert
- See more Expert Advice on Denial of Service (DoS) Attack Prevention-Detection and Analysis
-
packet monkey
On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network. Definition
-
Electrohippies Collective
The Electrohippies Collective is an international group of hacktivists based in Oxfordshire, England, whose purpose is to express its displeasure with the use of the Internet "as a tool for corporate communications and propaganda. Definition
-
Assessing the botnet threat
Botnet researcher Joe Stewart discusses the current threat levels presented by botnets and how to protect your enterprise from DDoS and other botnet attacks. Video
-
I'll be watching you: Wireless IPS
Focusing on IPS, Lisa Phifer of Core Competence Inc. discusses some of IPS' common features and how it differs from its wired counterparts. Video
-
Radware's Ron Meyran discusses DoS attack tools, planning, execution
Ron Meyran, Radware's director of security solutions, answers our questions about DoS attack planning and execution. News
-
Mega-DDoS attack prevention: How to prepare for larger DDoS attacks
Enterprises face increasing risks from mega-DDoS attacks. Expert Brad Casey provides advice on high-bandwidth DDoS attack prevention. Tip
-
How enterprises can prepare for Project Blitzkrieg-style DDoS attacks
Expert Nick Lewis offers security measures that enterprises, particularly financials, can utilize to fend off Project Blitzkrieg-style DDoS attacks. Answer
-
DDoS attack trends highlight increasing sophistication, larger size
Though the Spamhaus DDoS attack showed the potential devastation of increasing bandwidth, DDoS attack trends show DDoS type to be just as important. News
-
Prevent DDoS DNS amplification attacks by securing DNS resolvers
Expert Nick Lewis details how misconfigured DNS resolvers can be used for DDoS DNS attacks and how organizations can secure them. Answer
-
Activists unleash biggest DDoS cyber attack to date
Activists unleash a distributed denial-of-service (DDoS) attack in support of a web hosting firm, Cyberbunker, blacklisted by an anti-spam website cyber security
-
Preventing a distributed denial-of-service attack: Is hardware needed?
Expert Matthew Pascucci suggests four key questions to ask yourself when developing distributed denial-of-service attack mitigation tactics. Answer
-
Cleaning a compromised server: How to detect booter shells, remnants
Expert Nick Lewis discusses the importance of fully cleaning a compromised server and how to detect and remove booter shells and other remnants. Answer
-
Some activist DDoS attacks growing in sophistication, expert says
Most distributed denial-of-service attacks are easily filtered out, but individuals with the technical skills can mirror legitimate traffic. News
-
GoDaddy back online, affirms no data comprised
GoDaddy CEO Scott Wagner said the disruption was caused by an internal network glitch. News
- See more All on Denial of Service (DoS) Attack Prevention-Detection and Analysis
About Denial of Service (DoS) Attack Prevention-Detection and Analysis
Get advice on how to secure systems against flaws that can make your organization vulnerable to Denial of Service (DoS) attacks.
Security Management Strategies for the CIO