[OPLIN 4cast] OPLIN 4Cast #258: DoS'd for the holidays
Editor
editor at oplin.org
Wed Nov 30 10:33:27 EST 2011
Email not displaying correctly? View it in your browser.
<http://www.oplin.org/4cast/>
OPLIN 4Cast
OPLIN 4Cast #258: DoS'd for the holidays
November 30th, 2011
<http://www.oplin.org/4cast/wp-content/uploads/2011/11/denied_sm.png>Late in
the afternoon on Black Friday, the oplin.org website was hit by an
apparent Denial of Service (DoS) attack. DoS and DDoS (Distributed
Denial of Service) attacks overwhelm a website with so many requests for
connections that the webserver is too busy with this "junk" traffic to
respond to legitimate traffic. As a result, it looked like the OPLIN
website, and all the services that run on the same server - like the
/4cast/ - were offline for a couple of hours until we stopped the
attack. Why was oplin.org targeted? Good question, since it's a pretty
innocuous website, but certainly the timing of the attack suggests that
we may have been an innocent victim of a general increase in DoS attacks
that happens around the holidays.
* E-commerce, retail websites alert for DDoS attacks this holiday
season
<http://www.eweek.com/c/a/Security/ECommerce-Retail-Websites-Alert-for-DDoS-Attacks-this-Holiday-Season-308996/>
(eWEEK/Fahmida Y. Rashid) "DDoS attacks increased by 30 percent in
2010, and the number is expected to be higher in 2011, according
to Gartner estimates. The attacks have also been escalating in
size and complexity in 2011, according to Paul Sop, chief
technology officer at Prolexic. Attackers generally are throwing
more packets, using more bandwidth and targeting the application
layer, Sop said. E-commerce businesses aren't the only ones that
have to worry about DDoS attacks during this holiday season, as
hospitality, gaming and shipping services should also be on high
alert for DDoS attacks, Sop said."
* Corero advises retailers of risks associated with DDoS attacks
during holiday shopping season
<http://www.businesswire.com/news/home/20111122005131/en/Corero-Advises-Retailers-Risks-DDoS-Attacks-Holiday>
(BusinessWire) "DDoS attacks bring victim websites to a crawl or
halt, using network flooding techniques that have been in use for
more than a decade, and more recently, insidious application-layer
attacks which are very difficult to detect. Online commerce
depends on sites that are responsive and always available.
Frustrated customers will quickly abandon an unresponsive site and
go to another."
* Firewalls can't keep up with DDoS attacks
<http://www.pcworld.com/article/243743/firewalls_cant_keep_up_with_ddos_attacks.html>
(PCWorld/John E. Dunn) "The survey of 1000 medium and large
organizations in ten countries found that up to 45 percent of
respondents experience such attacks on a regular basis, a mixture
of application and network-layer incursions. About half rated
denial of service attacks as highly effective with 79 percent
saying they still relied on firewalls
<http://www.pcworld.com/businesscenter/article/221533/new_firewalls_should_increase_protection.html>
to deflect them despite 42 percent finding that such devices were
ineffective against conventional attacks at the network layer."
* Happy holidays: 5 ways to use DoS testing to thwart cyber
extortion
<http://www.breakingpointsystems.com/community/blog/cyber-monday-cyber-attack/>
(BreakingPoint/Pam O'Neal) "...online businesses still fear these
threats, with little confidence in the DoS mitigation and security
measures put in place to protect them. This is especially true for
Internet retailers, the latest victims of hacker-extortionists.
Internet retailers have a small window to 'get it right' when it
comes to hardening their resiliency to DoS or DDoS attacks. And
the post-Thanksgiving Cyber Monday is part of that small window."
*/Method fact:/*
Kaspersky Labs reports
<http://www.securelist.com/en/analysis/204792189/DDoS_attacks_in_Q2_2011> that
the "HTTP flood" method, which simply sends a huge number of HTTP
requests to the targeted site over a short period of time, accounted for
88.9% of all DDoS attacks in the second quarter of 2011.
------------------------------------------------------------------------
The */OPLIN 4cast/* is a weekly compilation of recent headlines, topics,
and trends that could impact public libraries. You can subscribe to it
in a variety of ways, such as:
* *RSS feed.* You can receive the OPLIN 4cast via RSS feed by
subscribing to the following URL:
http://www.oplin.org/4cast/index.php/?feed=rss2.
* *Live Bookmark.* If you're using the Firefox web browser, you can
go to the 4cast website (http://www.oplin.org/4cast/) and click on
the orange "radio wave" icon on the right side of the address bar.
In Internet Explorer 7, click on the same icon to view or
subscribe to the 4cast RSS feed.
* *E-mail.* You can have the OPLIN 4cast delivered via e-mail (a'la
OPLINlist and OPLINtech) by subscribing to the 4cast mailing list
at http://mail.oplin.org/mailman/listinfo/OPLIN4cast.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.oplin.org/pipermail/oplin4cast/attachments/20111130/9c37640d/attachment-0001.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: kubrickheader.jpg
Type: image/jpeg
Size: 38379 bytes
Desc: not available
Url : http://lists.oplin.org/pipermail/oplin4cast/attachments/20111130/9c37640d/kubrickheader-0001.jpg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: denied_sm.png
Type: image/png
Size: 24740 bytes
Desc: not available
Url : http://lists.oplin.org/pipermail/oplin4cast/attachments/20111130/9c37640d/denied_sm-0001.png
More information about the OPLIN4cast
mailing list