Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Another 100 Gigabit DDoS Attack Strikes — This Time Unreflected

Soulskill posted 1 year,24 days | from the go-big-or-go-home dept.

Security 93

darthcamaro writes "In March of this year, we saw the first ever 100 Gigabit DDoS attack, which was possible due to a DNS Reflection Amplification attack. Now word is out that a new 100 Gigabit attack has struck using raw bandwidth, without any DNS Reflection. 'The most outstanding thing about this attack is that it did not use any amplification, which means that they had 100 Gigabits of available bandwidth on their own,' Incapsula co-founder Marc Gaffan said. 'The attack lasted nine hours, and that type of bandwidth is not cheap or readily available.'"

Sorry! There are no comments related to the filter you selected.

Is that all? (5, Funny)

Anonymous Coward | 1 year,24 days | (#45011271)

It was probably just one guy in Tokyo using his $9/month internet package ...

Re:Is that all? (5, Funny)

goddidit (988396) | 1 year,24 days | (#45011309)

On his mobile, to be exact.

Re:Is that all? (5, Funny)

Cryacin (657549) | 1 year,24 days | (#45011323)

the guy mistyped the address on the page and hit refresh. Very Very quickly.

Re:Is that all? (5, Funny)

Yaotzin (827566) | 1 year,23 days | (#45011503)

...For nine hours.

Re:Is that all? (1)

aPoorBoy (2809507) | 1 year,23 days | (#45011579)

It must be a feature of windows phone

Re:Is that all? (1)

Behrooz Amoozad (2831361) | 1 year,23 days | (#45011613)

... not sending the WM_KEYUP.

Re: Is that all? (0)

Anonymous Coward | 1 year,23 days | (#45012235)

Well, he is hosting the entire Internet in the palm of his hand.

Re:Is that all? (0)

Anonymous Coward | 1 year,23 days | (#45012569)

he really wanted that squid/girl porn...

Re:Is that all? (0)

Anonymous Coward | 1 year,23 days | (#45013067)

Must have been a 30-something live-at-home male trying to refresh the page of the latest popular jailbail girlband

Re:Is that all? (1)

saleenS281 (859657) | 1 year,23 days | (#45014647)

Can you blame him? It wasn't loading.

Re:Is that all? (2)

Anubis IV (1279820) | 1 year,23 days | (#45014873)

Easily explained by the presence of a sleeping cat and the F5 key (oh, and he had some crazy Japanese phone that has an F5 key...).

Re:Is that all? (5, Funny)

wisnoskij (1206448) | 1 year,23 days | (#45012959)

It was a Korean professional Starcraft player.

Re:Is that all? (1)

MatthiasF (1853064) | 1 year,23 days | (#45019207)

kekekekekeke

Re:Is that all? (0)

Anonymous Coward | 1 year,23 days | (#45015211)

the guy mistyped the address on the page and hit refresh. Very Very quickly.

One IE browser would do this to you if your web.config was not set correctly. 50GB of IIS log files per minute.

Re:Is that all? (1)

BigLonn (786463) | 1 year,21 days | (#45034931)

The irony :P

first (-1, Flamebait)

Anonymous Coward | 1 year,24 days | (#45011291)

first sukka

Re:first (4, Funny)

oldhack (1037484) | 1 year,23 days | (#45012095)

If you were a Japanese dude with $9/month internet package, you could have been the first. Loser.

Incapsula (5, Informative)

Anonymous Coward | 1 year,24 days | (#45011297)

Seriously...this reads like a brochure for Incapsula's services lol

Re:Incapsula (5, Interesting)

Joce640k (829181) | 1 year,24 days | (#45011453)

They don't name the site, they don't name the attacker, the customers were "completely unaffected"....they could be making it up for all we know.

Re:Incapsula (5, Informative)

lazybeam (162300) | 1 year,23 days | (#45012005)

We are an Incapsula customer and I can tell you we were NOT "completely unaffected". We experienced about an hour total of complete down time and several hours of slow response. Our servers were unloaded - no problems when bypassing Incapsula. So I guess they protected us from "that" but in the meantime all sites were unreachable. Though different ISPs had different levels of slowness at different times (trying our two different office connections and three different mobile networks).

Re:Incapsula (4, Interesting)

Joce640k (829181) | 1 year,23 days | (#45012333)

We are an Incapsula customer and I can tell you we were NOT "completely unaffected".

Maybe you could call Sean Michael Kerner at eWeek and tell them Marc Gaffan was lying.

He's also on twitter: https://www.twitter.com/techjournalist [twitter.com]

Re:Incapsula (1)

Igal Zeifman (2844293) | 1 year,15 days | (#45090311)

Hi, I work for Incapsula. Our service is used by thousands yet - on the day of attack (Sep 25) you`ll find no downtime reports on twitter, facebook or public forums. I can't imagine any scenario in which a 60 minute long downtime of our services would have gone unnoticed yet this is the first time I hear about this... I`m sure that what you describe here is a localized issue, which is *not* Incapsula-related. Please reach out to our support. We will be happy to assist you to investigate further.

Re:Incapsula (0)

Anonymous Coward | 1 year,23 days | (#45013415)

http://www.esecurityplanet.com/network-security/the-largest-ddos-ever-hits-the-internet.html
That link is in the referenced eweek article, CloudFlare and SpamHaus withstood 300GBps attacks back in March, so this is nothing more than an ad. Also the spamhaus one lasted for about a week. this was 9 hours.

Re:Incapsula (1)

davewoods (2450314) | 1 year,23 days | (#45017417)

Note: GBps !=Gbps. GB is 8 times larger than Gb.
You just said they withstood 2400 Gbps, which is incorrect. Also, it should be noted that the 300 Gbps quoted was only the peak, I think the average was only about 120 Gbps.

Re:Incapsula (1)

Igal Zeifman (2844293) | 1 year,15 days | (#45090243)

Hi I work for Incapsula. This is what happened: On Sep 25 we reported a 100Gbps DDoS attack (https://twitter.com/Incapsula_com/status/382945744593764353), as we often do with large DDoS events. To be perfectly honest, we didn't even know that this was news, until we were contacted by the reporter... Our initial report predates the coverage by almost a week so we couldn't make this up, at least not without planning this for weeks in advance. (we don't have time for such ploys) Also, we NEVER disclose our clients unless we have their permission to do so, which most are reluctant to provide. From security POV, the less information the attacker has - the better. Revealing your mitigation solution is not exactly a best practice.

Re:Incapsula (4, Interesting)

Anachragnome (1008495) | 1 year,23 days | (#45011729)

"....this reads like a brochure for Incapsula's services..."

http://bgp.he.net/AS19551#_whois [he.net]

Well, I imagine most US server farms are hurting pretty bad right now, what with all the NSA luvin' going around over here. Now imagine a company that has all of it's servers in the US, Israel and Germany (with a few in Japan)--in light of recent revelations regarding NSA spying--and maybe you'll understand why Incapsula is paying for ads/articles all over the damn place, including /.

They are fucked, and this marketing blitz is a Hail-Mary attempt to save their ass from the fire that Snowden just lit under it. Personally, I love a good BBQ.

Re:Incapsula (1)

Bahamut_Omega (811064) | 1 year,23 days | (#45011739)

I have a feeling we will hit the 2-3 terabit range in about 6-12 months.

Re:Incapsula (0)

Anonymous Coward | 1 year,23 days | (#45015511)

I agree. They're in no position to add the most important voice to the news cycle: the fact some websites have to pay someone like Incapsula to stay up while others don't is a free speech issue.

ISP's tend to blame the victim for DDoS. The exception is big cloud hosters: Google will ward off a DDoS aimed at silencing a free blogspot user without even thinking of connecting the blog's speech with the attack. The stewards of the Internet, like the attendees of NANOG and the cast of #networker, ought to be working on an answer to DDoS that can protect small sites instead of persisting with their current attitude, "they're your bits, so you pay for them." It's an internet architecture issue wallpapered over by opportunist CDN's and an oligarchy of sites that can't be DDoSed just because they're themselves as big as the Internet (of which, by definition, there can only be a few).

Is this an ad? (5, Insightful)

Anonymous Coward | 1 year,24 days | (#45011307)

TFA sure reads like one...

I can't get one thing (4, Insightful)

ruir (2709173) | 1 year,24 days | (#45011315)

If they haven't identified the attacker how can they say with 100% certainty it only came from one source, and was un-reflected? For I all I know, you could have a botnet fabricating packets with the same characteristics simultaneously.

Re:I can't get one thing (3, Informative)

icebike (68054) | 1 year,24 days | (#45011393)

The article suggests it was a "Distributed attack"

the victim of the attack is remaining in the shadows, not wanting to be publicly identified. The target Website is protected by cloud security vendor Incapsula, which was able to withstand the massive distributed denial-of-service (DDoS) attack and keep the targeted Website up and running.
which means it must have bounced off of some botnet used some means of amplifying the attack and make it appear to come from different targets. Had it not been so, they would know exactly where it came from.

Perhaps judging from the number of different sources, and the type of packets, they can calculate the number of control packets needed.
If they know it required a one-for-one ratio of control packets to target packets, that is what they mean by un-amplified.
But it doesn't mean they came via the same route.

Re:I can't get one thing (0)

Anonymous Coward | 1 year,23 days | (#45011819)

perhaps the control packets were amplified?

Re:I can't get one thing (5, Insightful)

malacandrian (2145016) | 1 year,23 days | (#45011869)

That is the point of using a botnet to run a DDoS, yes. A single control signal issues a huge surge in traffic. That doesn't make it an amplified attack though. An amplified attack is when the zombies trick a third party (such as a DNS server) to reply to the victim with more information than you sent them. This can up the size of the attack 100-fold.

Re:I can't get one thing (3, Interesting)

skids (119237) | 1 year,23 days | (#45014217)

This, and you can easily distinguish a reflected attack by the type of packet, which will be an unsolicited reply to an application level request.

I just wish the stupid script kiddies would realize that not every SNMPv2/SNMPv3 client that responds actually amplifies traffic or gives maybe a 30% gain (because what you're getting back is an "access denied") and so isn't worth it, and stop trying to reflect off the printers here. I'm sick of chasing around the people who are supposed to lock them down, and banning entire protocols that don't really, really deserve it just fills me with ick.

Re:I can't get one thing (1)

Igal Zeifman (2844293) | 1 year,15 days | (#45090267)

Hi I work for Incapsula. We use uptime monitoring for health checks + our reverse proxy technology ensures that every little bit of traffic comes through our cloud first. As a result we know if we have any downtime/spillage. Having said that, our multi-server data center are build in such a way that - in the even of DDoS - malicious traffic is quarantined and managed by filtered scrubbing servers. (which do not handle regular traffic)

How much bandwidth is that? (3, Interesting)

mveloso (325617) | 1 year,24 days | (#45011321)

Is that 100 GB/sec, 100 Gbps/sec, 100 GiB/sec, or 100 GiB over 9 hours?

Re:How much bandwidth is that? (4, Funny)

Anonymous Coward | 1 year,24 days | (#45011345)

It's probably not "100 Gbps/sec" since the seconds cancel out and thus isn't a measure of bandwidth (a 12MB attack would be pretty lame). And since TFS said "bits," not "bytes," all of those options with a capital "B" are also unlikely. So, the answer to your question is "no."

Re:How much bandwidth is that? (3, Funny)

Anonymous Coward | 1 year,24 days | (#45011375)

Seconds don't cancel... it gives you a 100Gbps^2 (aka, 100Gb.s^-2) which is a bandwidth acceleration...

Re:How much bandwidth is that? (0)

Anonymous Coward | 1 year,23 days | (#45015131)

Accelerating at that rate for 9 hours probably the relativistic effects should considered.

Re:How much bandwidth is that? (3, Informative)

Anonymous Coward | 1 year,24 days | (#45011379)

The "p" in "Gbps" is "per", that is "/". Therefore "Gbps/s" is "Gb/s^2", which would be a data rate acceleration. "100Gbps/s" would mean that every second, another 100 Gb/s were added to the data stream. Doing that for 9 hours would be quite impressive.

Re:How much bandwidth is that? (5, Funny)

Anonymous Coward | 1 year,24 days | (#45011445)

Using the perl "english words have lower priority than real operators" convention (see "and" v/s "&&"), the / binds more tightly than the "per" operator, and thus, it's Gb / (s/s). And the seconds therefore cancel. ;)

Re:How much bandwidth is that? (0)

Anonymous Coward | 1 year,23 days | (#45012867)

But it wasn't "gigabits per second / s", it was "Gbps/s" where the word is "Gbps" as a whole.

Re:How much bandwidth is that? (0)

Anonymous Coward | 1 year,23 days | (#45013237)

Using the perl "english words have lower priority than real operators" convention (see "and" v/s "&&"), the / binds more tightly than the "per" operator, and thus, it's Gb / (s/s). And the seconds therefore cancel. ;)

Using perl as a supporting argument... really

Re:How much bandwidth is that? (0)

Anonymous Coward | 1 year,23 days | (#45021333)

There's more than one way to pretend that what I did wasn't wrong. Or something like that.

Re:How much bandwidth is that? (1)

davewoods (2450314) | 1 year,23 days | (#45017599)

Wolfram Alpha says that 100Gb per second per second for 9 hours is about 10 times the estimated global IP data traffic rate in 2015.(1 ZB/year)

Re:How much bandwidth is that? (4, Informative)

TubeSteak (669689) | 1 year,24 days | (#45011347)

The attack peaked at 100 Gigabits per second
The webhost (actually a CDN) had 400 Gigabits of total bandwidth available + various DDOS protections in place.

RTFA

Re:How much bandwidth is that? (0)

Anonymous Coward | 1 year,24 days | (#45011415)

That's 100 Petabits per us, CRAZY!

Re:How much bandwidth is that? (1)

Anonymous Coward | 1 year,23 days | (#45011989)

Nowhere in that article is the word seconds, Gbps Gb/s or anything similar.

I might be sloppy to say Gigiabit without the /s once or twice, but it's almost like a study in avoiding the qualifier.

Re:How much bandwidth is that? (1)

davewoods (2450314) | 1 year,23 days | (#45017665)

He is right, I checked. For all we know, 100 Gigabits of data was transferred to the target over the course of 9 hours, and for some reason this was considered a DDoS attack. FYI: 100 Gigabits is only 12.5 Gigabytes... Exciting.

Re:How much bandwidth is that? (0)

Anonymous Coward | 1 year,24 days | (#45011351)

Gigabits -> The gigabit has the unit symbol Gbit or Gb

Re:How much bandwidth is that? (0)

Anonymous Coward | 1 year,24 days | (#45011363)

Obviously 100 Gb/9 hours. Which makes about 3 Mb/s, that is a not too fast DSL connection. It probably ended after 9 hours because the user had reached his data volume cap.

SCNR

Re:How much bandwidth is that? (1)

AHuxley (892839) | 1 year,24 days | (#45011447)

It will be interesting to see how some ISP move from adsl1/2, VDSL2, HFC to optical while considering security challenged consumer operating systems.
A clause about deep packet inspection, ongoing monitoring and the option for dynamic ISP speed reductions?

100 GBit isn't large (3, Insightful)

Anonymous Coward | 1 year,24 days | (#45011331)

A botnet with 10000 bots, each on a 10 MBit connection, will suffice.

Re:100 GBit isn't large (5, Funny)

wonkey_monkey (2592601) | 1 year,23 days | (#45011495)

Thank you Captain Multiplication.

Re:100 GBit isn't large (1)

thegoldenear (323630) | 1 year,23 days | (#45011507)

10 Mb/s upstream that is, not downstream.

Re:100 GBit isn't large (1)

tempmpi (233132) | 1 year,23 days | (#45011693)

10 Mb/s upstream is not that unusual these days. And many botnets are way bigger than 10000 bots. Even if each bot has just 2 Mb/s upstream, you only need 50000 Bots. And botnets are not limited to infecting computers on home user connections. Infecting 100 servers on 1 Gbit/s connections is also enough.

Re:100 GBit isn't large (1)

isorox (205688) | 1 year,23 days | (#45012195)

10 Mb/s upstream is not that unusual these days. And many botnets are way bigger than 10000 bots. Even if each bot has just 2 Mb/s upstream, you only need 50000 Bots. And botnets are not limited to infecting computers on home user connections. Infecting 100 servers on 1 Gbit/s connections is also enough.

Certainly isn't, I've got that in my office in South Africa, which as far as the internet goes is about as backwater as you can get in a G20.

Re:100 GBit isn't large (0)

Anonymous Coward | 1 year,23 days | (#45013211)

Not our fault your office is located in South Africa.

Re:100 GBit isn't large (2)

isorox (205688) | 1 year,23 days | (#45015251)

Not our fault your office is located in South Africa.

I have many offices. Some have 100mbit connections coming out their ears (Tokyo, HK, Singapore, Washington). Others struggle to get 10 (Kabul, Nairobi)

Beiruit is probably the only office which can't get 10mbit connection. The average is far higher.

Re:100 GBit isn't large (0)

Anonymous Coward | 1 year,23 days | (#45016009)

10 Mb/s upstream is not that unusual these days. And many botnets are way bigger than 10000 bots. Even if each bot has just 2 Mb/s upstream, you only need 50000 Bots. And botnets are not limited to infecting computers on home user connections. Infecting 100 servers on 1 Gbit/s connections is also enough.

Certainly isn't, I've got that in my office in South Africa, which as far as the internet goes is about as backwater as you can get in a G20.

So the USA isn't int he G20 I take it? Sorry for not knowing, I'm an American. We're not a part of the world until the 3000 as our greatest mind, Phillip J Fry, will one day learn.

Re:100 GBit isn't large (1)

wvmarle (1070040) | 1 year,23 days | (#45012581)

The bigger the upload available, the more tightly those servers will be managed. Making not only infection harder, but also detection and losing the bot-server more likely.

If I were a botnet owner I'd be reluctant to use more than say 10% of available upstream, especially where you're on 1 Gb/s you're sure to be noticed if you're using 1 Gb/s but you may get away with 100 Mb/s for a while (that shouldn't affect other services on that network too much). People that have this much bandwidth have it for a reason, the reason typically being that they want to use it for themselves.

Home networks are probably still the best target. Easy to get on ((unpatched) Windows), poorly managed ("I run Windows Update now and then, and I have a virus scanner - came with the system when I bought it last year - should be enough!"), so likely to hold on for long time. But upstream bandwidth is often low, and system is not always on.

Re:100 GBit isn't large (1)

Flere Imsaho (786612) | 1 year,23 days | (#45018301)

Hang on.
*scribbles on notepad*
I'm just checking your math on that. Yes, I got the same thing.

no real verifiable info but plenty of product plug (5, Informative)

YesIAmAScript (886271) | 1 year,24 days | (#45011339)

The worst example of advertisement through press release in recent memory.

At least on slashdot.

What? (0)

Anonymous Coward | 1 year,23 days | (#45013443)

I see no product mentioned in the summary, just someone talking about a large DDoS attack.

Re:What? (1)

davewoods (2450314) | 1 year,23 days | (#45017737)

FTFA:

The target Website is protected by cloud security vendor Incapsula, which was able to withstand the massive distributed denial-of-service (DDoS) attack and keep the targeted Website up and running.

There are a total of 8 mentions of Incapsula and how fantastic their services are.

Re:What? (0)

Anonymous Coward | 1 year,23 days | (#45020703)

Who reads the fucking articles?

Pff (0)

Anonymous Coward | 1 year,24 days | (#45011357)

Just wait until someone gets their hands on those juicy data center scale 400-500Gbit tubes by infecting servers with internal OS updates. Many use custom kernels, after all, so all it takes is one pissed off employee below the budget cut line. :-)

worst use of a DDoS (1)

muphin (842524) | 1 year,24 days | (#45011377)

why not use it ebay for that item you sooo wanted.... get rid of those sniper bids.
i see no profit or gain doing it to a CDN since they tend to have a distributed infrastructure...
possibly a poker/gambling site

Re:worst use of a DDoS (1)

Anonymous Coward | 1 year,23 days | (#45011705)

why not use it ebay for that item you sooo wanted.... get rid of those sniper bids.

i see no profit or gain doing it to a CDN since they tend to have a distributed infrastructure...

possibly a poker/gambling site

A) This was a test, and the real attack has yet to come.

B) This was a test, and the real attack happened while we were staring at this distraction as if it were some kind of voodoo.

C) All the above.

Perhaps we should hold judgement on those who can execute something like this until it is determined the purpose or intent. eBay and gambling is chicken shit compared to attacking banking or stock market.

Re:worst use of a DDoS (3, Insightful)

Anonymous Coward | 1 year,23 days | (#45011727)

You missed a possibility:

D) None of the above, it's just Incapsula's anti-DDoS services ad.

The article goes all how attack was "unknown to many" and "victim remains in shadows" (read: we can't even know whether it all took place), and then goes into something that reads like sales brochure.

Re:worst use of a DDoS (1)

wvmarle (1070040) | 1 year,23 days | (#45012595)

I too really wonder who that target may have been. It must be a pretty high profile or valuable site, for an attacker to throw that big an attack against them.

Another site down ... (-1)

Anonymous Coward | 1 year,24 days | (#45011471)

... http://www.usda.gov/ [usda.gov] because of another attack.

Re:Another site down ... (2)

faffod (905810) | 1 year,23 days | (#45012671)

Yes, usda.gov is down because of a DOS attack. But I don't think this attack can be measured in Gbits, GB/sec, GB/sec^2... In this case the attack is coming from a well known zombie botnet called congress. They measure bandwidth in tubes.

Re:Another site down ... (1)

X0563511 (793323) | 1 year,23 days | (#45013249)

You could probably measure congressional (in)activity in bitches per second?

Re:Another site down ... (0)

Anonymous Coward | 1 year,23 days | (#45016559)

In case someone thinks your humorous comment is completely in jest, the USDA web site (the FNS part anyway) is indeed down, which is why I have time to type this comment -- I upload and download data there (not publically accessible database) as part of my job, and they sent me an email yesterday saying it was going down at 3PM Eastern. So until the government starts back up my job is easier. Of course, I'll be working my ass off when they're back up, there'll be a lot of catching up on stuff that should be done but can't.

Nah not a DDos, just a pirate hosting. (0)

MouseTheLuckyDog (2752443) | 1 year,23 days | (#45011505)

Some guy broke into the server and placed a copy of the last episode of Breaking Bad in 1040p and all the traffic was just downloaders.

Bitcoins! (0)

Anonymous Coward | 1 year,23 days | (#45011533)

They paid in bitcoins [slashdot.org] !

I know what happened (4, Funny)

OhANameWhatName (2688401) | 1 year,23 days | (#45011615)

other than Incapsula and its own service providers that were on the receiving end—no one seemed to notice

Thanks a bunch for saving the internets Marc. I'll be sure not to notice again soon.

Re:I know what happened (1)

Igal Zeifman (2844293) | 1 year,15 days | (#45090365)

:) You are correct. Remind me of a movie quote (not sure which)... "When you do things right, people won't be sure you've done anything at all..."

A government playing war games ? (1)

Alain Williams (2972) | 1 year,23 days | (#45011719)

I am not saying that it is what happened this time, but we have to expect that the various governments that are tooling up for ''cyber warfare'' are going to want to try out their toys. A DOS is one of the ''cyber weapons'' that they will use, in addition to cracking web sites, virus infection, ... For a government 100 Gbps is not going to be expensive.

I wonder how far they have progressed on cyber alliances, so, perhaps, 10 NATO countries could each contribute their 10 Gbps DOS asset to create a 100 Gbps DDOS capability.

Re:A government playing war games ? (0)

Anonymous Coward | 1 year,23 days | (#45012327)

Or someone playing with the government web servers that is in shutdown?
I guess that's a good reason not to keep them running.

Another 100 Gigabit DDoS Attack Strikes — Th (-1)

Anonymous Coward | 1 year,23 days | (#45011781)

Oh! yeeh
http://thep-rofessional.blogspot.com/

Entirely Synchronistic (0)

Anonymous Coward | 1 year,23 days | (#45012153)

A problem in an internet cable from Brazil to the US, belonging (supposedly) to GVT, caused access slowdowns over the last couple of days. No relation at all, perhaps?

I can't get one thing !!! (0)

Anonymous Coward | 1 year,23 days | (#45012363)

Using the perl "english words have lower priority than real operators" convention (see "and" v/s "&&"), the / binds more tightly than the "per" operator, and thus, it's Gb / (s/s). And the seconds therefore cancel. ;)
http://www.zdownz.net/2013/09/yahoo-messenger.html

tu3girL (-1)

Anonymous Coward | 1 year,23 days | (#45012571)

Posts. Therefore clothes Or be a failure, its corpse downward spiral. Shower Don't just

That's nothing (3, Funny)

Lieutenant_Dan (583843) | 1 year,23 days | (#45012655)

I once experienced an DoS MitM LTE XSS attack that lasted 42 hours and had a steady stream of 105TB/ms using NetBIOS Saturation over AppleTalk techniques that spread over a redundant cluster of MBR using HPFS. Of course the victim wishes to remain in the shadows as sharing the company's identity would either harm their reputation or allow you to verify the plausibility of the incident.

Re:That's nothing (1)

davewoods (2450314) | 1 year,23 days | (#45017895)

105TB/ms over 42 hours (15.88ZB) Means you could copy the estimated information content of all human knowledge (about 12EB as of mid-1999) in about 2.52 minutes. Source: Wolfram Alpha.

Bullshit! (1)

Anonymous Coward | 1 year,23 days | (#45012933)

BULLSHIT!

An unbeknownst 100Gbps DDoS attack from a single source (that is somehow unknown), against an undisclosed target(!), that was miraculously defended against by this unknown company, who would have us believe that they are capable of doing this because of their shear might and use of magical incantations(?).

Bullshit! This entire and UTTERLY FICTITIOUS story is a thoroughly deceitful marketing campaign!

Re:Bullshit! (0)

Anonymous Coward | 1 year,23 days | (#45014045)

An unbeknownst 100Gbps DDoS attack from a single source (that is somehow unknown),

A DDoS attack is, by definition, NOT from a single source.

capable of doing this because of their shear might and use of magical incantations

No, they quite clearly stated it was because they have four times more available bandwidth than the DDoS was throwing at them.

story is a thoroughly deceitful marketing campaign!

Agreed.

100Gbit (1)

bored (40072) | 1 year,23 days | (#45013743)

Is what, 100 google users in kansas with compromised machines?

Or 1000 FIOS users...

Re:100Gbit (0)

Anonymous Coward | 1 year,23 days | (#45014609)

It's a few homosexuals in New Jersey.

Cheap Marketting (0)

Anonymous Coward | 1 year,21 days | (#45036249)

Many companies who selling DDos protection device are doing this to sell their solutions and this kind of fake news are how they are marketing in very cheapest way.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?