Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Botnet Networking The Internet

A Third of the Internet Experienced DoS Attacks in the Last Two Years (sciencedaily.com) 31

Long-time Slashdot reader doom writes: Over a two year period, a third of the IPv4 address space have experienced some sort of DoS attack, though the researchers who've ascertained this suspect this is an underestimate. This is from a story at Science Daily reporting on a study recently presented in London at the Internet Measurement Conference.

"As might be expected, more than a quarter of the targeted addresses in the study came in the United States, the nation with the most internet addresses in the world. Japan, with the third most internet addresses, ranks anywhere from 14th to 25th for the number of DoS attacks, indicating a relatively safe nation for DoS attacks..."

The study itself states, "On average, on a single day, about 3% of all Web sites were involved in attacks (i.e., by being hosted on targeted IP addresses)."

"Put another way," said the report's principal investigator, "during this recent two-year period under study, the internet was targeted by nearly 30,000 attacks per day."
This discussion has been archived. No new comments can be posted.

A Third of the Internet Experienced DoS Attacks in the Last Two Years

Comments Filter:
  • I installed Win95 on my DOS system. Am I safe?
  • by doom ( 14564 ) <doom@kzsu.stanford.edu> on Saturday November 04, 2017 @03:37PM (#55490123) Homepage Journal
    What I'd actually like to hear about are alternate designs that could be used to create a net without vulnerability to denial-of-service.
    • by jez9999 ( 618189 )

      The fundamental problem is DDoS with thousands of bots, is it not? In which case the fix is to get rid of all the insecure devices. Either refuse all traffic from them somehow or maybe have an opt-in internetwork where you're booted off if you're found to have an insecure device, having to earn your way back in.

      • Yep. That is the next step. Only "approved" devices can connect (iOS, Windows 10, etc). Be careful what you wish for.
    • by dog77 ( 1005249 )
      Quickly drop packets that don't have a correct cryptographic signature necessary to talk with a site. Make it a slow process requiring some human intervention to get a temporary cryptographic signature necessary to send a packet to a site. This way, the denial of service attack would be limited by the speed of the human. There would still be the problem of the site that gives out the cryptographic signature, but that function could be spread out and optimized making it impractical to attack.
  • I wonder, what is the ratio of per capita DoS attacks between sites that use the ASCII character set for their URL and sites that use other character sets for the URL? Is there a preference for victims using ASCII for the URL that's stronger than preferences based on the geographic location of the site owner?
  • I mean, jeez, Mozilla, why is Firefox so friggin' SLOW?

  • Here in Oz, last evening it was obvious the Internet was slowing down drastically, oh wait I'm on the NBN....

  • My home modem is subjected to 50 meg ddos attacks every day. I think the "1/3'd" cited is pretty much a low ball. My web servers see 1 gig attacks just about every day, and my mail servers see at least 1 million emails per day rejected based on nothing more than it's RIR space. We won't even discuss what is going on with port 22 since I do not allow password PAM and require a key. If you are in APNIC, LATNIC, BRNIC, and much of RIPE space, sorry. It's firewalled completely for all ports. (Except for the UK

No spitting on the Bus! Thank you, The Mgt.

Working...