1 / 4
文档名称:

AST-0109273_VeriSignMP_1113.pdf

格式:pdf   页数:4页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

AST-0109273_VeriSignMP_1113.pdf

上传人:yixingmaoj 2016/3/29 文件大小:0 KB

下载得到文件列表

AST-0109273_VeriSignMP_1113.pdf

相关文档

文档介绍

文档介绍:Thwarting DDoS Attacks with Cloud Defenses the results of a recent survey by IDG Research Services. Only half of respondents indicate they are highly confident in their ability to detect DDoS attacks and even fewer are highly confi - dent in their ability to essfully remediate such an attack. One survey respondent, Barr Snyderwine, CIO of a Maryland-based event pany, says that his level of concern has been raised due to assaults on vendors, including cloud and Domain Name Service (DNS) providers. “This really is the time to look at the issue intensely because you’ve got to have uptime,” he says. He’s considering dispersing some cloud-based applications across different providers and looking at his DNS provider to determine a backup strategy in the event of an assault. While many in the survey say they are somewhat confident in their ability to remediate, the experience of those who have suffered assaults may indicate that confidence levels are higher than they should be: Half say it took longer than expected to remediate the attack. A DDoS attack occurs when multiple hosts—often compromised PCs that are part of a “”—are used to carry out and amplify an attack. Attackers usually create the denial-of-service condition by either consuming server bandwidth or impairing the server itself. Typical targets include Web servers, DNS servers, application servers,