The sophistication of cybercriminals and the attraction of the “Black Hat” cyberspace have grown dramatically over the years. In the past, cyber assaults were carried out mostly by amateurs, motivated by boredom or plain curiosity. Nowadays, such activities might be the work of successful business ventures, holding big financial stake in their success. With increasing professionalism, the attack tactics continue to evolve, giving rise to new multi-team and multi-vector attacks.
The decoy
Large scale DDoS attacks slow down a company’s day-to-day operations, sometimes bringing them to a complete halt. During such an attack the whole IT team, often already thinly spread, can become completely engaged in restoring the infrastructure functionality, leaving other areas unattended.
Denial of service attack definition
However, a DDoS might be aimed at more than just disrupting service. In recent years we’ve witnessed cases where large service disruptions came in parallel with other attack vectors, where, whether intentionally or not, DDoS was used as a smokescreen, to pivot the defending team’s attention away from a more sophisticated and precise simultaneous offence, such as ATO (Account Takeover) or phishing.
Dispersing the fog
With Imperva Attack Analytics, we evaluate and distil thousands of application layer security events into a few readable security incidents.
A novel feature that Imperva Attack Analytics offers customers is an indication of network layer DDoS attacks correlating to incidents in the application layer.
The decoy
Large scale DDoS attacks slow down a company’s day-to-day operations, sometimes bringing them to a complete halt. During such an attack the whole IT team, often already thinly spread, can become completely engaged in restoring the infrastructure functionality, leaving other areas unattended.
Denial of service attack definition
However, a DDoS might be aimed at more than just disrupting service. In recent years we’ve witnessed cases where large service disruptions came in parallel with other attack vectors, where, whether intentionally or not, DDoS was used as a smokescreen, to pivot the defending team’s attention away from a more sophisticated and precise simultaneous offence, such as ATO (Account Takeover) or phishing.
Dispersing the fog
With Imperva Attack Analytics, we evaluate and distil thousands of application layer security events into a few readable security incidents.
A novel feature that Imperva Attack Analytics offers customers is an indication of network layer DDoS attacks correlating to incidents in the application layer.
Comments
Post a Comment