I would like to meet Polonius because …
Given a chance to meet any person, whom would you like …
Recently, some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks against them. Moreover, they have seen a certain profile of attacks. These attacks are significantly larger than the ones they're used to seeing. They last longer. They're more sophisticated. And they look like probing. One week, the attack would start at a particular level of attack and slowly ramp up before stopping. The next week, it would start at that higher point and continue. And so on, along those lines, as if the attacker were looking for the exact point of failure.
Describe a famous person that you would like to meet
Who would do this? It doesn't seem like something an activist, criminal, or researcher would do. Profiling core infrastructure is common practice in espionage and intelligence gathering. It's not normal for companies to do that. Furthermore, the size and scale of these probes -- and especially their persistence -- points to state actors. It feels like a nation's military cybercommand trying to calibrate its weaponry in the case of cyberwar. It reminds me of the US's Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on, to map their capabilities.
Katy Tur Talks Covering Donald Trump's Candidacy for …
I think you are wrong. The main two reasons being your assuming that the usual protection mechanisms still work (for everything except the DDOS) and the nature of a DDOS attack. There *is no* real protection, just some rather half-hearted mitigation. Once the traffic arrives at your firewall and other protection devices the damage is already done (and the costs incurred). Any protection whatsoever would need a propagation system (with all the caveats like trust problems).
Moreover, looking closer you will notice that all that equipment has a max pps limit, beyond which its working (or not) becomes undefined. Depending one the device that may translate to "pass everything" applied or to "cut off everything"
10/08/2016 · My Crazy Year with Trump
@B As we all know, and as article itself confirms, attacks could be made to seem to come from anywhere on the world, and I'm sure a great deal of hackers use Chinese IPs and servers. All I am saying is, the way he puts it "China or Russia would be my first guesses." sounds more like the text is aimed at average brainless yellow press reader, the sort of stuff you add to article on purpose to inspire cheeky discussion like the one we have now, in order to increase number of page hits. He should have avoided publishing such assumption without basing it on something more solid than "state actors" (so we know it's a state? Must be China or Russia) and "It's not normal for companies to do that" (like big companies are known to do normal stuff). Lets face it, "China or Russia would be my first guesses" sounds like a line out of black&white American movies.
All this makes me feel a bit disappointed in CodeProject, the newsletter that brought me to this page, as they even gave this article a headline.
Btw B, you're the only one here who is calling people "moronic" and makes crying baby sounds in comment box, so maybe you're the one who should contemplate on his "delayed adolescence."