If UDP reflection attacks are a cannon, TCP reflection attacks are like an assassin. In the offensive-defensive battle, though TCP reflection attacks cannot achieve the same amplification effects as UDP reflection attacks, they are covert and difficult to protect against. Proportions of various reflection attacks by count and traffic volume in 2020 Attackers tend to choose UDP that can amplify attack traffic by dozens or even hundreds of times to achieve high profits at low costs. It is true that TCP reflection attacks are uncommon. In the analysis of attack types, it is rare to discover reflection attacks based on the Transmission Control Protocol (TCP). NTP (Network Time Protocol) reflection, SSDP (Simple Service Discovery Protocol) reflection, and Memcached reflection attacks familiar to us are based on the User Datagram Protocol (UDP). Proportions of reflectors in 20 TCP Reflection Attacks like an Assassin From the attack source type, the proportion of reflectors increased to 14% in 2020. Compared with 2019, 2020 saw a significant increase in the number and proportion of reflection attacks. According to NSFOCUS’s latest 2020 DDoS Attack Landscape, reflection attacks made up 34% of all DDoS attacks in 2020. Reflection attacks, as nothing new, have become one of the most troublesome and common DDoS attacks and are dominant in bandwidth consumption DDoS attacks. Produced by: Siqi GUO, Qiwen LUO Increasingly Serious Reflection Attacks
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |