To achieve that, not affecting benign websites, the list needs to be accurate. To address this gap, this thesis proposed blocking the access to Booters by means of a blacklist. In order to tackle this problem, some researchers analyse the functioning of a handful of Booters - based on leaked databases of those Booters, however, no clear mitigation is proposed so far. There are dozens or even hundreds of active Booters present on the Internet, and it is possible for anyone to access any of them and perform an attack on anything connected to the Internet. Nowadays it can be done much easier than that: anyone can simply purchase a desired attack on the requested target, using a website, called a \textit. Those attacks used to be performed only by people who had sufficient knowledge and resources to do that. Without proper protection, any machine connected to the Internet can be made unavailable to its intended users under a DDoS attack. Distributed Denial of Service (DDoS) attacks are a continuously growing threat of the present Internet.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |