Another 100 Gigabit DDoS Attack Strikes — This Time Unreflected 93
darthcamaro writes "In March of this year, we saw the first ever 100 Gigabit DDoS attack, which was possible due to a DNS Reflection Amplification attack. Now word is out that a new 100 Gigabit attack has struck using raw bandwidth, without any DNS Reflection. 'The most outstanding thing about this attack is that it did not use any amplification, which means that they had 100 Gigabits of available bandwidth on their own,' Incapsula co-founder Marc Gaffan said. 'The attack lasted nine hours, and that type of bandwidth is not cheap or readily available.'"
Is that all? (Score:5, Funny)
It was probably just one guy in Tokyo using his $9/month internet package ...
Re:Is that all? (Score:5, Funny)
On his mobile, to be exact.
Re:Is that all? (Score:5, Funny)
Re:How much bandwidth is that? (Score:4, Funny)
It's probably not "100 Gbps/sec" since the seconds cancel out and thus isn't a measure of bandwidth (a 12MB attack would be pretty lame). And since TFS said "bits," not "bytes," all of those options with a capital "B" are also unlikely. So, the answer to your question is "no."
Re:How much bandwidth is that? (Score:3, Funny)
Seconds don't cancel... it gives you a 100Gbps^2 (aka, 100Gb.s^-2) which is a bandwidth acceleration...
Re:How much bandwidth is that? (Score:5, Funny)
Using the perl "english words have lower priority than real operators" convention (see "and" v/s "&&"), the / binds more tightly than the "per" operator, and thus, it's Gb / (s/s). And the seconds therefore cancel. ;)
Re:100 GBit isn't large (Score:5, Funny)
Re:Is that all? (Score:5, Funny)
...For nine hours.
I know what happened (Score:5, Funny)
other than Incapsula and its own service providers that were on the receiving end—no one seemed to notice
Thanks a bunch for saving the internets Marc. I'll be sure not to notice again soon.
Re:first (Score:4, Funny)
That's nothing (Score:3, Funny)
I once experienced an DoS MitM LTE XSS attack that lasted 42 hours and had a steady stream of 105TB/ms using NetBIOS Saturation over AppleTalk techniques that spread over a redundant cluster of MBR using HPFS. Of course the victim wishes to remain in the shadows as sharing the company's identity would either harm their reputation or allow you to verify the plausibility of the incident.
Re:Is that all? (Score:5, Funny)
It was a Korean professional Starcraft player.