Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
While its easier than ever to mount a DDoS attack today (with a mere $10
and searching for web stressor apps you can find many options), several
developments have made mounting a successful DDoS attack harder than
ever. First, the evolution to a distributed architecture of application delivery
added resiliency to an app and raised the difficulty of bringing down all
instances of a typically load balanced application. Second and just as
important, network-based defenses at either an ISP or on-premise have also
become much better at identifying and defending against DDoS attacks.
Today, while prices can still be high for some forms of DDoS security, for
relatively modest sums, anti-DDoS protection can be added to most CDNs.
Therefore the application owner often does not need to worry about
protecting their apps against DDOS attacks
2.
This is why we believe that cyber security solutions that factor in finegrained application layer behavior have a much better shot at detecting
cyber-attacks and APTs (advanced persistent threats). This is because the
most sophisticated attacks like APTs occur in the memory of the target
application. Ultimately, the attacker is trying to get to important data, most if
not all of it sits behind an application, and trying to take control of an
application by having their malicious code execute as opposed to the
applications good code presents the highest chance of success.
In my view, the ability to look deep inside the application process memory
for malware activity is the key to success for todays advanced threat
environment.