Sunday, February 9, 2020

Proven Practices for Securing Your Website against Distributed Denial Research Paper

Proven Practices for Securing Your Website against Distributed Denial of Service Attacks - DDoS - Research Paper Example It was identified that an Internet bulletin board called as 4chan initiated the attack by utilizing readers of the Internet bulletin board who participated to a campaign called as ‘payback’ to initiate a DDOS attack (McGARVEY, 2013). Likewise, the Motion picture association was apparently stimulated an Indian organization called as Aiplex for carrying out in contradiction of piratebay.com that is a file sharing website. As a result, Motion picture association was not available for more than a day and got attention of the media such as Reuters, British Broadcasting Company, London telegraph etc. One of the security research expert or advisors, Mr Sean Paul spoke on media about this incident and named it as ‘the future of cyber protests’. Likewise, he predicted that this is a part of a protest. Later, the assumptions made by the security expert were true, as again same type of attack was organized and time was the target was a credit card industry. The major p layers targeted in this attack were PayPal, MasterCard, Swiss banks and many others, as the objective was to impose penalty to these organizations for not providing services associated with whistleblowing site Wikileaks (Mansfield-Devine, 2014). Conversely, Wikileaks reported an incident i.e. DDOS attack soon after publishing highly confidential United State diplomatic cables. Later on, all the servers were moved to Amazon cloud seeking protection from these attacks (Crosman, 2014). Another DDOS attack targeted Russia’s most popular newspaper website more than one time within the last 24 months. The attacks were disabled for a week but Sokolov, who is executive editor in chief, is still seeking a cyber-criminal behind these attacks. Likewise, he suspects a government funded agency ‘Kremlin Youth’ is behind these attacks, as no support was given by the local authorities within the country. It is eminent that these DDOS attacks are now considered

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.