Einschränkung der Auswahl
Alle Artikel aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008/2009
oder nur Artikel des
• Entwickler Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2008-2010
alle (lang!)
• Mobile Technology aus
2019
2016
2015
2014
2012/2013
alle (lang!)
• PHP Magazin / PHP User aus
2019
2018
2017
2016
2015
2014
2013
2012
2011
2009/2010
alle (lang!)
• windows.developer / dot.Net Magazin aus
2019
2018
2017
2016
2015
2014
2013
2012
2008-2011
alle (lang!)
• oder der anderen Magazine
Schlimmer geht immer?
DDoS-Angriffe und wer davon profitiert
Im
Entwickler Magazin 3.19
ist ein Artikel über DDoS-Angriffe (Distributed Denial-of-Service) erschienen.
Eine
Leseprobe
des Artikels gibt es auf entwickler.de.
Links
- [1] Carsten Eilers: "Cyberkriminelle erobern das IoT"; Entwickler Magazin 1.2017
- [2] Brian Krebs; Krebs on Security, 21.9.2016: "KrebsOnSecurity Hit With Record DDoS"
- [3] Octave Klaba, @olesovhcom auf Twitter, 20.9.2016: "we got 2 huge multi DDoS: 1156Gbps then 901Gbps"
- [4] Octave Klaba, @olesovhcom auf Twitter, 22.9.2016: "Last days, we got lot of huge DDoS. Here, the list of "bigger that 100Gbps" only. You can see the simultaneous DDoS are close to 1Tbps !"
- [5] Octave Klaba, @olesovhcom auf Twitter, 26.9.2016: "@iblametom we are talking about the same botnets: GRE 550Gbps. TCP/ACK packet size 1440 400Gbps. TCP/ACK-PSH 200Gbps. TCP/SYN 200Gbps"
- [6] Brian Krebs; Krebs on Security, 25.9.2016: "The Democratization of Censorship"
- [7] Google Project Shield
- [8] Brian Krebs; Krebs on Security, 1.10.2016: "Source Code for IoT Botnet ‘Mirai’ Released"
- [9] jgamblin/Mirai-Source-Code auf GitHub
- [10] Dyn Inc. Status, 21.10.2016: "DDoS Attack Against Dyn Managed DNS"
- [11] Scott Hilton; Dyn Blog, 26.10.2016: "Dyn Analysis Summary Of Friday October 21 Attack"
- [12] Level 3 Threat Research Labs, 18.10.2016: "How the Grinch Stole IoT"
- [13] Catalin Cimpanu; BleepingComputer, 24.11.2016: "You Can Now Rent a Mirai Botnet of 400,000 Bots"
- [14] Dima Bekerman; Incapsula Blog, 29.3.2017: "New Mirai Variant Launches 54 Hour DDoS Attack against US College"
- [15] Dinesh Venkatesan; Symantec Threat Intelligence, 23.8.2018: "New Wave of Mirai Leverages Open-Source Project for Cross Platform Infection Technique"
- [16] yegenshen; 360 Netlab Blog, 20.10.2017: "IoT_reaper: A Rappid Spreading New IoT Botnet"
- [17] Hunter; Radware Blog, 12.2.2018: "New Satori Botnet Variant Enslaves Thousands of Dasan WiFi Routers"
- [18] RootKiter; 360 Netlab Blog, 17.1.2018: "Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address"
- [19] Brian Krebs; Krebs on Security, 18.1.2017: "Who is Anna-Senpai, the Mirai Worm Author?"
- [20] Brian Krebs; Krebs on Security, 13.12.2017: "Mirai IoT Botnet Co-Authors Plead Guilty"
- [21] Department of Justice, U.S. Attorney’s Office, District of Alaska, 18.9.2018: "Hackers’ Cooperation with FBI Leads to Substantial Assistance in Other Complex Cybercrime Investigations"
- [22] Jaime Cochran; CloudFlare Blog, 28.8.2017: "The WireX Botnet: How Industry Collaboration Disrupted a DDoS Attack"
- [23] Liron Segal; F5 Features, 7.10.2016: "Mirai: The IoT Bot That Took Down Krebs and Launched a Tbps DDoS Attack on OVH"
- [24] Igal Zeifman, Dima Bekerman, Ben Herzberg; Incapsula Blog, 26.10.2016: "Breaking Down Mirai: An IoT DDoS Botnet Analysis"
- [25] Carsten Eilers: Angriffe auf TCP/IP (2) - DoS
- [26] Dima Bekerman, Dan Breslaw; Incapsula Blog, 15.11.2016: "How Mirai Uses STOMP Protocol to Launch DDoS Attacks"
- [27] Carsten Eilers: "Angriffe auf TCP/IP (8) - Die Entwicklung der DDoS-Angriffe"
- [28] Marek Majkowski; Cloudflare Blog, 11.10.2016: "Say Cheese: a snapshot of the massive DDoS attacks coming from IoT cameras"
- [29] Marek Majkowski; Cloudflare Blog, 27.2.2018: "Memcrashed - Major amplification attacks from UDP port 11211"
- [30] Shengbao Cai, Zhang Lu, Li Fu; PowerOfCommunity-Konferenz 2017: "Deluge – How to generate 2TB/s reflection DDoS data flow via a family network"
(PDF)
- [31] Sam Kottler; GitHub Engineering, 1.3.2018: "February 28th DDoS Incident Report"
- [32] BSI: "Zunahme von DDoS-Angriffen durch DNS-Reflection v2.0"
- [33] BSI: "Auswahlkriterien für qualifizierte DDoS-Mitigation-Dienstleister"
- [34] Rommel Joven, Evgeny Ananin; Fortinet Threat Research, 26.10.2018: "DDoS-for-Hire Service Powered by Bushido Botnet"
- [35] BSI: "Liste qualifizierter DDoS-Mitigation-Dienstleister"
- [36] BSI: "Prävention von DDoS-Angriffen v2.0"
- [37] BSI: "Abwehr von DDoS - Angriffen v2.0"
- [38] BSI: "Anti-DDoS-Maßnahmen v2.0"
- [39] Damian Menscher, Enigma 2017: "Drawing the Foul: Operation of a DDoS Honeypot"
- [40] Brian Krebs; Krebs on Security, 3.2.2017: "How Google Took on Mirai, KrebsOnSecurity"
- [41] Dan Goodin; Ars Technica, 2.2.2017: "How Google fought back against a crippling IoT-powered botnet and won"