"36 krypton hung up. "" Life does not go up. "" Enjoy hanging out. "Starting from July 22, 2015, micro-credit, micro-blog a howl. The software operators also have Twitter channel: because of cloud service providers qingyun failed, resulting in a Albatron's own site and App that doesn't serve.
Failure intermittent reached one day, so speculation is this fault is caused due to a DDoS attack. However, Qing Yun in the official micro-blog to clarify the next day, resulted from the purchase of H3C switches failed, causing no regular service to repair progress and continuous update on the Twitter, was not fully repaired until 23rd more than six o'clock in the evening. , The "culprit" H3C is also a front row apology on Twitter.
Events come to an end, but the buddies debate. A hardware damage caused by accidents like this, why are people suspected DDoS attack? If you suffer from real DDoS attacks, cloud service providers have any contingency measures?
Rogue = nuclear weapons + bully?
Security experts have said: "DDoS attack of nuclear weapons. "In the area of the network, is the effect of DDoS attacks. Coupled with the recent DDoS attacks number in a geometric growth, people inside the nuclear fears lingering.
Nuclear weapon roughly destroying everything; its people into despair, there's not much. DDoS attacks? Comprehensive network of Lei Feng have been introduced before. (Please stamp: that our server was black DDoS why at every turn), in simple terms, joint multiple computers is that the attacker floods hit the target server.
Use an image in the article, for example
Bully are play for General customer has been crowded in opponents of shops, Lai with not go, real of shopping who is cannot into; or always and salesperson fits of East pulled West pulled, let staff cannot normal service customer; also can for shops of operators provides false information, shops of up and down busy into a mission zhihou is found are is one empty, eventually run has real of big customer, loss heavy. Bullies are these bad things sometimes difficult to finish by going it alone, you need to call a lot of people together.
In 2013, the famous open source video player VLC has suffered DDoS attacks, webmaster tools made this simulated attack video. Countless flow of concentrate into the server scenario, it was a little bit excited me. Perhaps because of this epic picture, DDoS attacks are also known as the beautiful evil. In theory, the DDoS if you gather a sufficient number of attacks, you can take out any Internet business.
Tuhaocai anti-DDoS
Attacks against the Internet, has evolved to the point of refinement. Hackers could sneak into the server, steal confidential information or access to financial accounts and steal money. All the attacks, DDoS that attack stuck in the door she let people can't do business can be said to be the least technical content. However, it is precisely because of this massive, easily to qiaoshanzhenhu worked wonders.
Tencent network secure Xu Dongshan, head to Lei feng, many underground team of professionals involved in DDoS attack now become a huge industry, as long as money, or even an ordinary person can leverage the power of the gray industrial for DDoS attacks. Security vendor Venus Chen, OU Yang Mei, Deputy has posted an information, displayed in the 2014 US $ 600 million in global revenue of DDoS attacks, DDoS, China market is about $ 30 million, that number is unprecedented.
Also revealed by Xu Dongshan, now online for a medium-scale DDOS attack costs about 10,000 yuan. Which does not completely fall into the hackers own pockets, because the attack is the most important resource of traffic and bandwidth, these resources must be real money to buy or rent. So-called soldiers to block punches, the implementation of Defense requires a great deal of traffic. However, I was in darkness, the enemy in the dark, enemy guerrillas, as soldiers in time of war, to the village for the people; and we want to raise standing armies, the regular army, of course, is expensive.
Rules of the game so that small companies want to cry but no tears. DDoS defense to hire a bandwidth of millions of Yuan, which has not been attacked, these bandwidth is completely idle. As a "local tyrants" spokesmen of Alibaba Shu public safety experts said: "I am not sarcastic. Large-scale DDOS defense, that costs are not small companies to carry it live. "
That's right, 1 million is so much
Anti-DDoS of Kung Fu River
Face of DDoS attacks is tricky because, a lot of troll rogue mixed in a few want to buy things, merchants cannot tell, this time into a dilemma: pay for hardcore, may lose his Crown; closed, bitch laugh.
Ivy tells of Lei feng, a spokesman for internal cloud security service providers network, faced with two basic DDoS solution:
1, flow part cleaning-pinch out the attack traffic, equivalent to root out disruptive rogue, kicked out of the gate.
--Expanding the capacity of server 2, expanded bandwidth, equivalent to get more customer service, beautiful reception every customer.
Insiders made a vivid metaphor for journalists:
In theory, qingyun of such cloud services providers like a shopping mall, it sublet to the company store. Among them, one is the containment (DDoS), and qingyun is not actually responsible for. However, in today's competition, service is important. To provide customers with a higher level of security services, is now cloud services business mainstream. Moreover, when hackers secretly put in one of the shops in the shopping mall violates policies of small goods such as movies, national is looking for revenge. From this perspective, for merchants equipped with a few more security, but the choice of shopping malls.
Then, these cloud service provider or cloud security service providers, what are the unique weapon against DDoS attacks?
Albatron iPhone5 Vans
Qing Yun PR colleague networks provide their user manuals of Lei feng, a treatment plan involving all types of DDoS. One of which is provided by qingyun of load balancers, to pressure-sharing requests to the back-end so that you can effectively attack traffic across the backyard, and then conquer.
Tencent
As the cloud security market giant Tencent also has its own unique experience, Tencent cloud security official Xu Dongshan told reporters, in the face of all kinds of fancy DDoS, the cloud security company based responses are similar. For example, there are 10 routes to attack a company may use 1, 2, 3,B companies may use 2, 3, 4. Tencent has also launched a program called "tayu" system of protection, when it comes to large traffic attack, Dayu system based on the real impact of the attack, by modifying the domain name resolution result, making normal traffic quickly allocated to nodes that are not affected. After treating the affected repair, Dayu system automatically import the nodes line traffic. In General is using guerrilla warfare tactics against DDoS attacks.
Lei feng's network learned that Tencent's cloud has a unique advantage, it's installed capacity giant Tencent computer Butler. If a computer with the computer Butler computers controlled by hackers to launch DDoS attacks, the Butler will automatically cut off the flow.
Artifact against DDoS attack, there is a Bug-like existence, that is the backbone. Backbone network is a physical connection between the major cities of fiber-optic networks, China Mobile, China Unicom, Telecom backbone network of the three giants are the main providers. In simple terms, backbone bandwidth has reached the degree of open hanging, can withstand most DDoS attacks Tencent cloud security and backbone operators, in the event of overload data requests, will backbone network traffic to the "Ocean".
China Telecom Vans phone case
Other security companies are sad that, China Telecom can not quietly done a world outside expert, in recent years, China Telecom has also launched its own security products: "cloud bank." Sitting on a backbone network of telecommunications does not speculate that IP of the attack directly along its own cable can reach the location of the attack, directly around the attacker's throat. Telecom cloud bank official Liu Zi Qian told reporters: "the data through an analysis of telecommunication network router can be judged from the outside or from other operators, and locate points which is the operator, which city or even IDC machine room and dispatch equipment for traffic to clear and Telecom attack prevention capacity theoretically infinite. "
Words to this degree should end this battle of Wulin. However, can afford to use the backbone enterprises of the network against DDoS attacks, even two hands to count them.
After all, if the DDoS and the largest nuclear weapons have in common, is that they require a lot of money. DDoS to the devil, if you want to overcome it, the fight still pocket money. Local tyrants of the world is dangerous, cock wire is hurry up and go home. The world is so cruel.
Tips
Micro sweep sweep, author tips bar ~
68 votes
Xinjiang Phantom 3 Advanced
Seemingly seen HD footage people, basic can no longer accept Phantom 2 Vision+ mobile APP that 320x240 the mosaic screen. Also need to pay attention to is that HD is the integrated uplink remote control signals, it was greatly expanded by Phantom 3 remote control distance up to 2000 meters. I measured in the previous generation Intel HD graph distance of more than 2000 meters, a new generation of products, the 2000 meters from the water certainly is not.
View details of the voting >>
No comments:
Post a Comment