Deja Vu All Over Again – DDoS Amplification Attacks

Yep, it’s time to use this title again. This time we’re talking about Distributed Denial of Service (DDoS) amplification attacks. One of the lists I monitor posted the following: Christian Rossow has done some great work on DDoS.  The two interesting papers are: “Exit from Hell? Reducing the Impact of Amplification DDoS Attacks,” read here. The…

Details

Anti-Viral

Aggregating is the inverse of broadcasting.   What complicates this is that many technologies are now used for both.  Cell phones are the best example.  They are a device originally designed for communication. Their original purpose was  for transmitting information between individuals and they have evolved into one that can broadcast that information via social media. …

Details

Big Data And Us Little People

The last series I wrote for securitycurrent dealt with principles of data security and privacy. Many authorities charged with enforcing data protection accept the principles. They are based on the idea that the actors in data transactions ( i.e., subjects, collectors, disclosers, users and regulators) all have a role to play in creating and maintaining the world…

Details