From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Attackers fill networks

Attackers fill networks

From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Start my 1-month free trial

Attackers fill networks

- [Instructor] The best known denial of service attacks are network flooding attacks where a lot of computers send a lot of packets to you. This fills up your network pipes. In June of 2020, Amazon reported being hit with an attack that sustained 2.3 terabits per second for several days. They also reported that the 99th percentile is only 43 gigabits per second. I've been a little informal, using packets and data interchangeably, but network operations folks don't. Attacks that send a lot of data can do so in large packets, which fill the pipes, or with more smaller packets, which can cause trouble for network equipment. Attackers can go from running scripts to uploading a lot of data. Your web servers support posts to don't they? To writing lower level code, to sending lots of data ignoring things like TCP congestion controls or otherwise sending as much data as will fit on their local network. The attacker's also…

Contents