SlideShare a Scribd company logo
1 of 15
Download to read offline
DDoS Attacks, Russia, 2011-
2012: Patterns and Trends


           Artyom Gavrichenkov
           ximaera@highloadlab.com
Statistics

    2011-2012: > 2500 attacks

    17% – ICMP/UDP/SYN/ACK flood

    40 attacks > 1 Gbps




                                   2
Statistics

    Max. attack duration before December,
    2011: 486 hours




                                            3
4
5
Statistics

    Max. attack duration, 2011-2012: 1228 hours




                                                  6
7/x
One botnet from Southern Asia

    2011, December, http://slon.ru: ~200000 bots

    2012, May, http://tvrain.ru: ~182000 bots

    ~500 IP addresses in common




                                                   8
Abuse from Indonesia

"what is your ip address 178.248.233.23. you've
done ip flooding / ddos to my server. please
stop to all conveniently. thx

178.248.233.23.80    >   x.x.x.x.56834: S ack
178.248.233.23.80    >   x.x.x.x.3821: S ack
178.248.233.23.80    >   x.x.x.x.4947: S ack
178.248.233.23.80    >   x.x.x.x.4948: S ack
178.248.233.23.80    >   x.x.x.x.32935: S ack



                                                  9
Statistics

    Max. registered bandwidth:
    56 Gbps (July, 2011)

    Max. botnet size:
    200000 bots (December, 2011)

    4 attacks from multiple botnets
    simultaneously

    Attacks often utilize the newest
    vulnerabilities


                                       10
http://www.nic.ly/   11
Monday

  Tuesday

Wednesday

 Thursday

    Friday

  Saturday

   Sunday
             0   100   200   300   400   500   600



                                               12
ISPs

    Weekends often see larger attacks

    ISP tech. support in Russia works better
    on workdays

    ISPs and IXPs often totally ignore abuses




                                                13
January
 February
    March
     April
      May
     June
      July
   August
September
  October
November
             0   20   40   60   80   100   120   140   160




 December excluded as untypical (legislative election)
                                                       14
Attack Goals

  Money

  Politics

  Botnet promotion

  Protest
+ B1TC01N$: BKDR_BTMINE.DDOS




                               15

More Related Content

Similar to DDoS Attacks, Russia, 2011- 2012: Patterns and Trends

Cybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesCybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and Issues
Alex Matrosov
Β 
Hacklu2012 v07
Hacklu2012 v07Hacklu2012 v07
Hacklu2012 v07
F _
Β 
Honeypot Project
Honeypot ProjectHoneypot Project
Honeypot Project
Manikyala Rao
Β 
091209 Mc Afee Roundtable
091209 Mc Afee Roundtable091209 Mc Afee Roundtable
091209 Mc Afee Roundtable
Harvard PR
Β 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
Lior Rotkovitch
Β 
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS AttacksDSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
Andris Soroka
Β 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
IbuSrikandi
Β 
Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)
packetloop
Β 

Similar to DDoS Attacks, Russia, 2011- 2012: Patterns and Trends (20)

Arbor Presentation
Arbor Presentation Arbor Presentation
Arbor Presentation
Β 
Cybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesCybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and Issues
Β 
Lazarus talk tlp white
Lazarus talk   tlp whiteLazarus talk   tlp white
Lazarus talk tlp white
Β 
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSDSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
Β 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
Β 
Hacklu2012 v07
Hacklu2012 v07Hacklu2012 v07
Hacklu2012 v07
Β 
Honeypot Project
Honeypot ProjectHoneypot Project
Honeypot Project
Β 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
Β 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
Β 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
Β 
091209 Mc Afee Roundtable
091209 Mc Afee Roundtable091209 Mc Afee Roundtable
091209 Mc Afee Roundtable
Β 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
Β 
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS AttacksDSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
DSS ITSEC Conference 2012 - Radware - Protection from SSL DDOS Attacks
Β 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Β 
Igor Beliaiev "Incident Busters. Human Security Interaction"
Igor Beliaiev "Incident Busters. Human Security Interaction"Igor Beliaiev "Incident Busters. Human Security Interaction"
Igor Beliaiev "Incident Busters. Human Security Interaction"
Β 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
Β 
Botnet
BotnetBotnet
Botnet
Β 
Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)Auscert Finding needles in haystacks (the size of countries)
Auscert Finding needles in haystacks (the size of countries)
Β 
KRNIC Data Driven DNS Security
KRNIC Data Driven DNS SecurityKRNIC Data Driven DNS Security
KRNIC Data Driven DNS Security
Β 
Barbarians at the Gate(way) - Dave Lewis - Codemotion Amsterdam 2018
Barbarians at the Gate(way) - Dave Lewis - Codemotion Amsterdam 2018Barbarians at the Gate(way) - Dave Lewis - Codemotion Amsterdam 2018
Barbarians at the Gate(way) - Dave Lewis - Codemotion Amsterdam 2018
Β 

More from HLL

ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...
ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...
ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...
HLL
Β 
DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)
DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)
DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)
HLL
Β 
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈDDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
HLL
Β 
Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅
Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅
Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅
HLL
Β 
АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...
АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...
АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...
HLL
Β 
Russian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ
Russian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈRussian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ
Russian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ
HLL
Β 
ΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊ
ΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊ
ΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊ
HLL
Β 
НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...
НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...
НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...
HLL
Β 
Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...
Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...
Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...
HLL
Β 
Π”ΠΈΠ½Π°ΠΌΠΈΠΊΠ° DDoS-Π°Ρ‚Π°ΠΊ Π² России
Π”ΠΈΠ½Π°ΠΌΠΈΠΊΠ° DDoS-Π°Ρ‚Π°ΠΊ Π² РоссииДинамика DDoS-Π°Ρ‚Π°ΠΊ Π² России
Π”ΠΈΠ½Π°ΠΌΠΈΠΊΠ° DDoS-Π°Ρ‚Π°ΠΊ Π² России
HLL
Β 
DDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ
DDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽDDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ
DDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ
HLL
Β 
ВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсов
ВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсовВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсов
ВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсов
HLL
Β 
Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹
Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹
Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹
HLL
Β 

More from HLL (20)

Beyond the botnet
Beyond the botnetBeyond the botnet
Beyond the botnet
Β 
Game of BGP
Game of BGPGame of BGP
Game of BGP
Β 
Dumb Ways To Die: How Not To Write TCP-based Network Applications
Dumb Ways To Die: How Not To Write TCP-based Network ApplicationsDumb Ways To Die: How Not To Write TCP-based Network Applications
Dumb Ways To Die: How Not To Write TCP-based Network Applications
Β 
BGP Route Stability
BGP Route StabilityBGP Route Stability
BGP Route Stability
Β 
DDoS: Practical Survival Guide
DDoS: Practical Survival GuideDDoS: Practical Survival Guide
DDoS: Practical Survival Guide
Β 
ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...
ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...
ΠŸΠΎΡ€ΡΠ΄ΠΎΠΊ прСодолСния Π±ΠΎΠ»ΠΎΡ‚Π° Π½Π° ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚Π΅: ΠΊΠ°ΠΊ Π½Π΅ Π½Π°Π΄ΠΎ ΠΏΠΈΡΠ°Ρ‚ΡŒ прилоТСния, основа...
Β 
DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)
DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)
DDΠΎS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ. (Π§Π°ΡΡ‚ΡŒ 2: Π Π°Π±ΠΎΡ‚Π° Π½Π°Π΄ ошибками)
Β 
Detecting Autonomous Systems Relationships
Detecting Autonomous Systems RelationshipsDetecting Autonomous Systems Relationships
Detecting Autonomous Systems Relationships
Β 
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈDDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π² 2011 Π³ΠΎΠ΄Ρƒ: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
Β 
Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅
Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅
Π¦ΠΈΠΊΠ»Ρ‹ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ Π½Π° ΠΌΠ΅ΠΆΠ΄ΠΎΠΌΠ΅Π½Π½ΠΎΠΌ сСтСвом ΡƒΡ€ΠΎΠ²Π½Π΅
Β 
АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...
АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...
АрхитСктура Ρ†Π΅Π½Ρ‚Ρ€Π° очистки Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° (ЦОВ): Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ уровня ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π° связи ΠΈ ΠΊΠΎ...
Β 
Russian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ
Russian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈRussian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ
Russian Internet Core: ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΌΠ°Ρ€ΡˆΡ€ΡƒΡ‚ΠΈΠ·Π°Ρ†ΠΈΠΈ
Β 
ΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊ
ΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊ
ΠšΠ»Π°ΡΡΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ DDoS-Π°Ρ‚Π°ΠΊ
Β 
НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...
НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...
НСкоторыС аспСкты влияния сходимости ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° BGP Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ сСтСвых рСс...
Β 
Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...
Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...
Π’Π°Π½Π΄Π΅ΠΌΠ½Ρ‹Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ / ΠŸΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° уязвимостСй Π² спСцификации TCP/IP (Ρ„ΡƒΠ½Π΄Π°ΠΌ...
Β 
Π”ΠΈΠ½Π°ΠΌΠΈΠΊΠ° DDoS-Π°Ρ‚Π°ΠΊ Π² России
Π”ΠΈΠ½Π°ΠΌΠΈΠΊΠ° DDoS-Π°Ρ‚Π°ΠΊ Π² РоссииДинамика DDoS-Π°Ρ‚Π°ΠΊ Π² России
Π”ΠΈΠ½Π°ΠΌΠΈΠΊΠ° DDoS-Π°Ρ‚Π°ΠΊ Π² России
Β 
DDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ
DDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽDDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ
DDoS: ΠŸΡ€Π°ΠΊΡ‚ΠΈΡ‡Π΅ΡΠΊΠΎΠ΅ руководство ΠΊ Π²Ρ‹ΠΆΠΈΠ²Π°Π½ΠΈΡŽ
Β 
ВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсов
ВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсовВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсов
ВлияниС сСтСвых Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ Π½Π° Π΄ΠΎΡΡ‚ΡƒΠΏΠ½ΠΎΡΡ‚ΡŒ рСсурсов
Β 
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π ΡƒΠ½Π΅Ρ‚Π° Π² 2011-2012 Π³Π³.: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π ΡƒΠ½Π΅Ρ‚Π° Π² 2011-2012 Π³Π³.: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈDDoS-Π°Ρ‚Π°ΠΊΠΈ Π ΡƒΠ½Π΅Ρ‚Π° Π² 2011-2012 Π³Π³.: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
DDoS-Π°Ρ‚Π°ΠΊΠΈ Π ΡƒΠ½Π΅Ρ‚Π° Π² 2011-2012 Π³Π³.: Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ ΠΈ Ρ‚Π΅Π½Π΄Π΅Π½Ρ†ΠΈΠΈ
Β 
Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹
Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹
Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Π°Ρ€ΠΈΠΉ Anonymous ΠΈ Π΅Π³ΠΎ ΠΏΠΎΡ€Π°ΠΆΠ°ΡŽΡ‰ΠΈΠ΅ Ρ„Π°ΠΊΡ‚ΠΎΡ€Ρ‹
Β 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
Β 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Β 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Β 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Β 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Β 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Β 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Β 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Β 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Β 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Β 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Β 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Β 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Β 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Β 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Β 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Β 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Β 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Β 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Β 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Β 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Β 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Β 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Β 

DDoS Attacks, Russia, 2011- 2012: Patterns and Trends

  • 1. DDoS Attacks, Russia, 2011- 2012: Patterns and Trends Artyom Gavrichenkov ximaera@highloadlab.com
  • 2. Statistics  2011-2012: > 2500 attacks  17% – ICMP/UDP/SYN/ACK flood  40 attacks > 1 Gbps 2
  • 3. Statistics  Max. attack duration before December, 2011: 486 hours 3
  • 4. 4
  • 5. 5
  • 6. Statistics  Max. attack duration, 2011-2012: 1228 hours 6
  • 7. 7/x
  • 8. One botnet from Southern Asia  2011, December, http://slon.ru: ~200000 bots  2012, May, http://tvrain.ru: ~182000 bots  ~500 IP addresses in common 8
  • 9. Abuse from Indonesia "what is your ip address 178.248.233.23. you've done ip flooding / ddos to my server. please stop to all conveniently. thx 178.248.233.23.80 > x.x.x.x.56834: S ack 178.248.233.23.80 > x.x.x.x.3821: S ack 178.248.233.23.80 > x.x.x.x.4947: S ack 178.248.233.23.80 > x.x.x.x.4948: S ack 178.248.233.23.80 > x.x.x.x.32935: S ack 9
  • 10. Statistics  Max. registered bandwidth: 56 Gbps (July, 2011)  Max. botnet size: 200000 bots (December, 2011)  4 attacks from multiple botnets simultaneously  Attacks often utilize the newest vulnerabilities 10
  • 12. Monday Tuesday Wednesday Thursday Friday Saturday Sunday 0 100 200 300 400 500 600 12
  • 13. ISPs  Weekends often see larger attacks  ISP tech. support in Russia works better on workdays  ISPs and IXPs often totally ignore abuses 13
  • 14. January February March April May June July August September October November 0 20 40 60 80 100 120 140 160 December excluded as untypical (legislative election) 14
  • 15. Attack Goals  Money  Politics  Botnet promotion  Protest + B1TC01N$: BKDR_BTMINE.DDOS 15