Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please read this article and discuss the topic and explain why it is relevant to computer forensics. (Write a paragraph of minimum 150 words) Home

Please read this article and discuss the topic and explain why it is relevant to computer forensics. (Write a paragraph of minimum 150 words)

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

Home > Security > Data Security NEWS New toolkit seeks routers, Internet of Things for DDOS botnet Dubbed Spike, the toolkit has been used in a distributed denial of service attack that reached a peak of 215 gigabits per second By Antone Gonsalves cso SEP 24, 2014 7:02 PM PDT ed NETSCOUT. KNOW YOU'RE ENEMY BETTER THAN IT KNOWS YOU. Waiting for widgets.outbrain.com. Security researchers have recently discovered a toolkit capable of infecting computers, routers and Internet of Things devices to launch large-scale simultaneous DDOS attacks. DDOS mitigator Akamai Technologies uncovered the toolkit, dubbed Spike, about six months ago and has stopped attacks against enterprise customers in Asia and the U.S. One distributed denial of service attack peaked at 215 gigabits per second and 150 million packets per second. AXIS [ Prepare to become a Certified Information Security Systems Professional COMMUNICATIONS with this comprehensive online course from PluralSight. Now offering a 10- day free trial!] "It was pretty impressive," David Fernandez, head of Akamai's PLXsert lab, said. The toolkit is unique in that it can infect Linux, Windows and ARM-based systems. As a result, a Spike-based botnet could comprise PCs, servers, routers and Internet of Things (loTs) devices, such as smart thermostats. Akamai has not seen any loTs devices in the botnet it has uncovered. However, the fact that the creators developed binary payloads for ARM and Linux suggests that attacks on loTs devices is possible. "They could be subjected to future exploitation and infection for these types of (DDOS) campaigns," Fernandez said. Also unusual is Spike's ability to launch different types of DDOS attacks simultaneously. For example, attackers could use four separate command- and-control servers to launch against a single target SYN, UDP, GET and Domain Name System query floods. BY SCOTT ADAMS DILBERT BrandPost Sponsored by Cato Networks SASE: What It Is, What It Isn't, and Why Should You Even Care Secure Access Service Edge is bigger NO0OD THE FIREUALL UY GTS LAND FOR DMAT, ILANT PROPLE WLL SAY, TVERYTHONG LORED UNTIL YOU CHANGED THE FALL VOU TO NSTALL THE NEW FINEL WHY ME WHY ME EVERY ROBLEM than SD-WAN and a lot more than THERE WILL BE NO AEST FOR ME IWAL HAVE TO DEPENE HYMLF AAINST A CONTINUOUS BARAGE OF ACCUSATIONS TRRAINDER TO THE INEVITABLE VILLAGERS GA YOUR PETOORS AND TORDIES ITS ALLAYS THE FIRUALL EVERYONE BLAMES THE STDNKIN FIREWALL HOW DID HE GET TAT LAY stuffing virtual appliances in the cloud. IRAM THE FIRELIAL Akamai believes Spike originated in Asia, because only Mandarin was used in the toolkits the company found. To block Spike, a company can add infrastructure attack signatures to access control lists. For blocking attacks on the application layer, Akamai has released a SNORT signature. SNORT is a widely used open source network intrusion detection and SNORT is a widely used open source network intrusion detection and prevention system. Akamai also suggests hardening systems against attacks by keeping patches up to date and following the guidance provided by several organizations, including the SANS Institute, Microsoft, the National Security Agency, the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP). BrandPost Sponsored by Salesforce Success Cloud The Business and IT: Collaborating for Customer Success There are two key approaches to inspiring new collaboration between business and IT teams: Clean Slate and Firewall. Read more to find out how they work. Akamai is also calling on the security research community, including and government and private vend launch a effort to cleanup Spike-infected systems while the botnet is still young. "Unless there are significant community cleanup efforts, this bot infestation is likely to spread," the company said in a threat advisory. Home > Security > Data Security NEWS New toolkit seeks routers, Internet of Things for DDOS botnet Dubbed Spike, the toolkit has been used in a distributed denial of service attack that reached a peak of 215 gigabits per second By Antone Gonsalves cso SEP 24, 2014 7:02 PM PDT ed NETSCOUT. KNOW YOU'RE ENEMY BETTER THAN IT KNOWS YOU. Waiting for widgets.outbrain.com. Security researchers have recently discovered a toolkit capable of infecting computers, routers and Internet of Things devices to launch large-scale simultaneous DDOS attacks. DDOS mitigator Akamai Technologies uncovered the toolkit, dubbed Spike, about six months ago and has stopped attacks against enterprise customers in Asia and the U.S. One distributed denial of service attack peaked at 215 gigabits per second and 150 million packets per second. AXIS [ Prepare to become a Certified Information Security Systems Professional COMMUNICATIONS with this comprehensive online course from PluralSight. Now offering a 10- day free trial!] "It was pretty impressive," David Fernandez, head of Akamai's PLXsert lab, said. The toolkit is unique in that it can infect Linux, Windows and ARM-based systems. As a result, a Spike-based botnet could comprise PCs, servers, routers and Internet of Things (loTs) devices, such as smart thermostats. Akamai has not seen any loTs devices in the botnet it has uncovered. However, the fact that the creators developed binary payloads for ARM and Linux suggests that attacks on loTs devices is possible. "They could be subjected to future exploitation and infection for these types of (DDOS) campaigns," Fernandez said. Also unusual is Spike's ability to launch different types of DDOS attacks simultaneously. For example, attackers could use four separate command- and-control servers to launch against a single target SYN, UDP, GET and Domain Name System query floods. BY SCOTT ADAMS DILBERT BrandPost Sponsored by Cato Networks SASE: What It Is, What It Isn't, and Why Should You Even Care Secure Access Service Edge is bigger NO0OD THE FIREUALL UY GTS LAND FOR DMAT, ILANT PROPLE WLL SAY, TVERYTHONG LORED UNTIL YOU CHANGED THE FALL VOU TO NSTALL THE NEW FINEL WHY ME WHY ME EVERY ROBLEM than SD-WAN and a lot more than THERE WILL BE NO AEST FOR ME IWAL HAVE TO DEPENE HYMLF AAINST A CONTINUOUS BARAGE OF ACCUSATIONS TRRAINDER TO THE INEVITABLE VILLAGERS GA YOUR PETOORS AND TORDIES ITS ALLAYS THE FIRUALL EVERYONE BLAMES THE STDNKIN FIREWALL HOW DID HE GET TAT LAY stuffing virtual appliances in the cloud. IRAM THE FIRELIAL Akamai believes Spike originated in Asia, because only Mandarin was used in the toolkits the company found. To block Spike, a company can add infrastructure attack signatures to access control lists. For blocking attacks on the application layer, Akamai has released a SNORT signature. SNORT is a widely used open source network intrusion detection and SNORT is a widely used open source network intrusion detection and prevention system. Akamai also suggests hardening systems against attacks by keeping patches up to date and following the guidance provided by several organizations, including the SANS Institute, Microsoft, the National Security Agency, the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP). BrandPost Sponsored by Salesforce Success Cloud The Business and IT: Collaborating for Customer Success There are two key approaches to inspiring new collaboration between business and IT teams: Clean Slate and Firewall. Read more to find out how they work. Akamai is also calling on the security research community, including and government and private vend launch a effort to cleanup Spike-infected systems while the botnet is still young. "Unless there are significant community cleanup efforts, this bot infestation is likely to spread," the company said in a threat advisory

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beyond Big Data Using Social MDM To Drive Deep Customer Insight

Authors: Martin Oberhofer, Eberhard Hechler

1st Edition

0133509796, 9780133509793

More Books

Students also viewed these Databases questions

Question

draft a research report or dissertation;

Answered: 1 week ago