Network Transmission Media Types & Protection against DDOS

In the beginning, the Internet was designed to “just work”. The basic Internet protocols that we use every day including HTTPS (web traffic), SMTP (email), and DNS (converting URLs to IP addresses) weren’t designed to be secure. As a result, additional protocols have been developed after the fact to help improve the security of these protocols. However, protocols aren’t the only potential design “problems” of the Internet. Features like broadcast, anycast, and multicast were designed to handle certain situations, but they can also be used and abused in attacks.

Network Transmission Media Types & Protection against DDOS

In this post, we’ll talk about how these protocols are used for both good and evil, and why they make it necessary for organizations to deploy strong DDoS protection.

What are Broadcast, Anycast, and Multicast?

Unicast, multicast, broadcast, and anycast are different transmission types over the Internet. While it seems unnecessary to have four different ones, they all have their uses.

Unicast is the simplest option. This type of transmission is designed to go from a single source to a single destination, which seems like the only option that you’d really need (you’re only trying to visit a specific website, right?). However, the others are useful too. As the name suggests, multicast traffic has multiple recipients. You can specify a multicast group of recipients, and only the members of this group would receive the message. This is the middle group between unicast and broadcast. Broadcast is the equivalent of shouting your message in a crowded, quiet room. The person that you’re talking to hears the message, but so does everyone else. Every subnetwork has a broadcast address, which is used when the sender doesn’t know exactly how to reach their desired recipient or to send messages intended for multiple recipients (like a Public Service Announcement over the radio/TV).

Anycast is the most peculiar of the transmission types. An anycast message is designed to reach any of a group of possible recipients, but it doesn’t care which one. This is often used when an organization has multiple webservers scattered geographically. An anycast request for the website from the US will go to the US webserver rather than wasting the time and effort to grab the same webpage from the Australian webserver.

These protocols are all designed for good reasons, but any protocol can be used for good and evil. Some protocols are used to create Denial of Service attacks and others can be used to protect against them.

DDoS and Protocol Abuse

One of the ways that the broadcast transmission type is abused is through the smurf attack. Like the little blue guys from the TV show, the transmissions used in a smurf attack are small but they tend to cause a lot of trouble.

Smurf attacks take advantage of a technique called IP spoofing, where the attacker pretends to be someone else by sending a transmission using their IP address as the source address. This is similar to what those relentless telemarketers do when they pretend to be calling from a phone number similar to yours to trick you into thinking that it’s someone that you know.

In a smurf attack, the attacker sends a small transmission that is a request that requires a response from the recipient. Typically, the size of the response is bigger than the size of the request, so receiving and processing a single response will put more strain on the target (the spoofed source of the request packet) than on the attacker. Since a Denial of Service attack’s main goal is to overwhelm the victim, this is good for the attacker.

Processing a single response probably won’t cause too much of a headache for the victim (computers do it all the time), but what about hundreds? This is where broadcasts come into play. By sending the spoofed request to a network’s broadcast address, the attacker gets every computer in that network to send a response to the (very confused) target. Depending on the number of computers in the network (and the number of request packets sent by the attacker), this can easily overwhelm the victim: successful DDoS.

Protection Against DDoS

While broadcast can be easily abused to amplify Denial of Service attacks, not all uses of network transmission types are evil. One advantage of multicast traffic is that it can help alleviate the strain caused by a Distributed Denial of Service (DDoS) attack.

In anycast, a request goes to exactly one of a set of possible recipients. This can easily be used to implement load balancing, where the choice of recipient is based upon a set of factors (usually geography). In order to perform a global DDoS attack against a target using anycast for load balancing, the attacker needs the volume necessary to take down all of the servers since the attack will be distributed across them.

Blocking the Right Stuff

DDoS attacks are a significant threat to all organizations. The price of performing a DDoS attack is depressingly low for an attacker but the financial impact to the victim can be extremely high. One step that organizations can take to reduce the threat of DDoS attacks is to lock down broadcast addresses to devices inside the network only, to decrease the probability that they’ll be used in a smurf attack. From a defensive perspective, setting up DDoS protection and load balancing is also a great idea.

COMMENTS


Name

25PP,2,3G,3,4G,4,Absinthe,5,Adobe Flash,3,Ads,10,Affiliate Marketing,6,AliExpress,1,Amazon,51,Amazon Phone,1,Amazon Tablet,7,AMD,5,Android,230,Android 10,1,Android 6,3,Android 7,4,Android 8,9,Android 9,4,Android APK,36,Android Apps,99,Android Auto,3,Android Games,13,Android GApps,3,Android Gingerbread,2,Android Ice Cream Sandwich,8,Android Jelly Bean,21,Android KitKat,12,Android Lollipop,10,Android Marshmallow,3,Android N,5,Android Nougat‬,5,Android O,7,Android Oreo,8,Android P,2,Android PC Suites,1,Android Pie,3,Android Q,1,Android SDK,9,Android TV,9,Android USB Drivers,2,Android Wear,10,Angry Birds,6,Anti Virus,15,App Developer,18,Apple,635,Apple CarPlay,1,Apple Pay,1,Apple Store,17,Apple TV,89,Apple Watch,37,Apps,73,ARM,1,Asus,2,ATT,7,Baidu,1,Battery,2,Bill Gates,2,Bing,12,Bitcoin,8,Bittorrent,4,BlackBerry,11,BlackBerry App,3,Blockchain,3,Blogger,32,Blogs,46,Bluetooh,6,Business,206,BuySellAds,1,Call Center,5,Camera,7,Cars,3,CCTV,1,Certifications,10,China Mobile,3,Chrome,25,Chrome OS,6,ChromeBook,2,ChromeBox,2,Chromium,4,CISPA,1,Cloud,30,CMS,6,Communication,12,Computer,51,Cortana,1,Credit Cards,5,CRM,9,Cryptocurrency,6,Currency,6,Cyberbullying,2,Cydia,43,Cydia Apps,10,Cydia Tweaks,10,Debit Cards,4,Developers,27,Digital Camera,8,Digital Marketing,251,Digital Signage,2,Disqus,1,DMCA,1,Doodle,1,DOS,1,Downgrade,14,Dropbox,1,Drupal,3,Earn Money Online,40,EarPods,1,eCommerce,26,Electra,6,Electronic Arts,1,Emulator,4,Encryption,1,Entrepreneurs,36,eReader,4,eSignature,1,Ethereum,1,Evasi0n,16,eWallet,4,Facebook,128,Facebook Ads,11,Facebook Apps,19,Facebook Credits,4,Facebook Developers,3,Facebook Like,8,Facebook Marketing,12,Facebook Messenger,5,Facebook Pages,9,Facebook Photos,2,Facebook Stocks,2,FacePAD,1,FaceTime,2,FileSonic,2,Firefox Add-Ons,2,Firefox OS,2,Fitbit,1,Foursquare,1,FP,6,Framaroot,4,Free Stuff,28,Gadgets,142,Galaxy Nexus,2,Galaxy S-Voice,2,Game of Thrones,1,Games,50,Gaming Console,11,Gaming Laptops,9,GApps,2,GearBest,6,Gifts,6,Gmail,10,Google,240,Google +1,10,Google Ads,5,Google Adsense,3,Google Adwords,4,Google Analytics,1,Google Apps,11,Google Earth,2,Google Fit,2,Google Glass,8,Google IO Conference,4,Google Map,7,Google Music,2,Google Nexus,13,Google Nexus Player,1,Google Panda,1,Google Penguins,1,Google Play Edition,1,Google Play Store,16,Google Plus,17,Google Plus Pages,6,Google Search,25,Google TV,5,Google Voice,6,Google Wallet,1,Google+,16,Google+ App,1,Google+ Pages,6,Graphic Design,4,GreenPois0n,28,Groupon,6,GSM,3,Guest Posts,10,h3lix,2,Hack,82,Hackintosh,4,Hard Disk,11,Hard Drive,14,HDD,14,Headsets,4,HealthVault,1,Home Automation,13,Hootsuite,1,Hostgator,1,Hotspot Shield,1,HP,2,HTC,15,HTC One,6,HTML5,15,HTTPS,2,Huawei,2,Huawei Honor,2,Hyper-V,3,IBM,2,iCloud,22,iGoogle,2,iMac,9,Infographic,180,Instagram,6,Intel,7,Internet,240,Internet Explorer,18,Internet IPOs,1,Internet Marketing,65,Internet Protocols,3,iOS,381,iOS 10,21,iOS 11,28,iOS 12,16,iOS 13,4,iOS 4,1,iOS 5,17,iOS 5.0.1,5,iOS 5.1,9,iOS 5.1.1,12,iOS 5.2,1,iOS 5.2.1,1,iOS 6,73,iOS 6.0.1,13,iOS 6.0.2,5,iOS 6.1,21,iOS 6.1.1,3,iOS 6.1.2,4,iOS 6.1.3,7,iOS 6.1.4,4,iOS 6.1.5,2,iOS 6.1.6,2,iOS 7,59,iOS 7.0.1,2,iOS 7.0.2,2,iOS 7.0.3,1,iOS 7.0.4,2,iOS 7.0.5,1,iOS 7.0.6,5,iOS 7.1,25,iOS 7.1.1,6,iOS 7.1.2,6,iOS 8,60,iOS 8.0.1,5,iOS 8.0.2,5,iOS 8.1,12,iOS 8.1.1,2,iOS 8.1.2,1,iOS 8.1.3,1,iOS 8.2,6,iOS 8.3,5,iOS 8.4,10,iOS 8.4.1,4,iOS 9,33,iOS 9.0.1,1,iOS 9.0.2,1,iOS 9.1,6,iOS 9.2,2,iOS 9.2.1,2,iOS 9.3,3,iOS 9.3.1,2,iOS 9.3.2,4,iOS 9.3.3,4,iOS 9.3.4,2,iOS 9.3.5,2,iOS Apps,66,iOS Beta,13,iOS Games,13,IP,3,iPad,364,iPad 2,54,iPad 3,47,iPad 3G,1,iPad 4,9,iPad Air,3,iPad Apps,28,iPad Mini,29,iPad Mini 2,2,iPad Siri,4,iPadOS,5,iPhone,415,iPhone 3G,52,iPhone 3GS,6,iPhone 4,63,iPhone 4S,67,iPhone 5,33,iPhone 5C,4,iPhone 5S,14,iPhone 6,31,iPhone 6 Plus,9,iPhone 7,2,iPhone Apps,28,iPhone Siri,7,IPO,3,iPod,202,iPod 4G,2,iPod 5G,1,iPod Apps,15,iPod Classic,1,iPod Nano,7,iPod Shuffle,5,iPod Siri,5,iPod Touch,205,IPv4,1,IPv5,1,IPv6,1,iShower,1,iShower Speaker,1,IT,2,iTunes,193,Jailbreak,129,Jailbreak Tools,37,Jitterbug Touch,1,Joomla,5,Kaspersky,1,Keyboards,2,Keylogger,1,Kindle,9,Kindle Fire,3,Kingo,2,KingRoot,1,Laptop,57,Lasers,1,Launchers,3,Lava,1,LCD,2,Legal,5,Lenovo,2,Lenovo ThinkPad,1,LG,9,LiberiOS,2,Lightning Cables,1,Link Building,3,LinkedIn,4,Linux,13,Lockerz,1,Logitech,1,Lync Desk Phones,1,Mac,193,Mac Mini,3,Mac OS X,202,MacBook,3,MacBook Air,10,MacBook Pro,10,Macintosh,4,macOS,65,macOS 10.12,9,macOS 10.13,9,macOS 10.14,8,macOS 10.15,1,macOS Beta,3,macOS Catalina,2,macOS High Sierra,9,macOS Mojave,8,macOS Server,3,macOS Sierra,9,Magento,1,Mambo,3,Maps,9,Mark Zuckerberg,2,Marketing,67,Marketplace,1,Meego,2,Megaupload,1,Micromax,1,Microsoft,199,Microsoft Office,34,Microsoft SharePoint,1,Microsoft Surface,3,Microsoft Surface Pro,2,MIUI,3,Mobile,707,Mobile App Developers,17,Mobile Apps,177,Mobile Broadband,1,Mobile OS,27,Mortgage,1,Moto X,1,Motorola,6,Mouse,2,Movies,1,Mozilla Firefox,16,Music,10,MySpace,2,Nasdaq,1,Net Meeting,1,Nexus,7,NFC,1,Nikon,1,Nintendo,3,Nintendo 3DS,2,Nokia,31,Nokia Belle,2,Nokia Lumia,8,Nokia Normandy,1,Nokia Store,2,Nokia X,6,Notebook,1,Nuance,1,Office 2010,8,Office 2013,2,Office 2016,11,Office 365,7,Open Graph,1,Open Source,1,Opensn0w,1,Opera,6,Opera Mini,2,Operating System,69,Oppo,1,Oracle,2,Orkut,1,OS,47,OS X 10.10,65,OS X 10.10.1,6,OS X 10.10.2,9,OS X 10.10.3,10,OS X 10.10.4,6,OS X 10.10.5,4,OS X 10.11,25,OS X 10.11.1,3,OS X 10.11.2,2,OS X 10.11.3,2,OS X 10.11.4,2,OS X 10.11.5,3,OS X 10.11.6,2,OS X 10.8,2,OS X 10.9,37,OS X 10.9.1,2,OS X 10.9.2,5,OS X 10.9.3,12,OS X 10.9.4,7,OS X 10.9.5,5,OS X El Capitan,23,OS X Mavericks,40,OS X Mountain Lion,17,OS X SDK,9,OS X Server,48,OS X Server 3,5,OS X Server 4,15,OS X Server 5,9,OS X Yosemite,60,Outlook,8,Ovi,2,Ovi Store,1,P0sixspwn,1,P2P,1,PageRank,2,Pangu,11,Payments,10,PayPal,3,PDF,7,Personalization,1,PhotoBox,1,Photography,6,Picnik,1,Pinterest,2,PIPA,2,Piracy,3,PlayStation,6,PlayStation 4,4,Pocophone,2,Pod2g,2,Podcasts,1,Powerpoint,2,PP,2,Printers,7,Privacy,48,Programming,18,Projectors,1,PS4,4,Python,1,QMobile,1,QMobile Noir,1,RAM,2,Redsn0w,23,Remote Access,5,Root Android,36,Rovio Mobile,4,S-Voice,2,Safari,34,Samsung,58,Samsung Galaxy,30,Schemer,1,Search Engine,56,Search Engine Marketing,43,Search Engine Results,32,Seas0nPass,2,Secure Socket Layer,2,Security,74,Selfie,1,SEM,37,SEO,91,SEO Tools,11,SERP,2,Server,10,Shopping,42,Signage,1,Sileo,1,SIM Card,2,Siri,12,SkyDrive,3,Skype,5,SlideShare,1,Small Business,186,Smart TV,4,Smart Watch,6,Smartphones,661,SMM,6,SMO,12,Sn0wbreeze,5,SnapChat,3,Social Media,101,Social Media Marketing,60,Social Media Optimization,46,Social Media Tools,9,Social Networking,160,Software,198,Sony,19,Sony Ericsson,5,Sony VAIO,1,Sony Xperia,3,SOPA,2,Speakers,3,Sprint,2,Spyware,2,SSD,14,SSL,2,Startups,54,Statistics,23,Stock,3,Stock Photography,2,Stock Photos,2,Storage,25,Store,30,Swift,10,Swype,1,Symbian,8,T-Mobile,4,Tablets,559,TaiG,5,TechGlobeX,3,TechGlobeX.net,1,Technology,191,Telephone,1,Television,8,Templates,3,TinyUmbrella,2,Tools,96,Torrent,3,Toshiba,2,Toshiba Satellite,1,TuneUp Utilities,1,TV,10,tvOS,34,Twitter,16,TypePad,3,Ubuntu,6,Ultrasn0w,1,Unlock,42,USB Debugging,2,uTorrent,4,Verizon,4,Video Marketing,7,Video Optimization,8,Videos,35,Virtualization,7,Virus,7,Visual Studio,3,Vlogging,3,Vlogs,3,Vodafone,2,Voice Call,17,VoIP,12,VPN,9,Walmart,2,watchOS,31,Wearables,13,Web,117,Web Browser,26,Web Browser Plugins,3,Web Design,24,Web Development,42,Web Domains,15,Web Hosting,29,Web Servers,17,Western Digital,1,WhatsApp,5,Whited00r,1,WiFi,3,WiFi Calling,1,WiFi Hotspots,3,Windows,161,Windows 10,19,Windows 10 Enterprise,2,Windows 10 Mobile,1,Windows 10 Pro,2,Windows 10 Server,3,Windows 7,33,Windows 8,48,Windows 8 Pro,3,Windows 8 RT,3,Windows 8.1,6,Windows 8.1 Enterprise,1,Windows 9,4,Windows Apps,4,Windows Live,3,Windows Live Essentials,5,Windows Live Messenger,6,Windows Media Center,1,Windows Mobile,19,Windows Phone,47,Windows Phone 10,1,Windows Phone 7,10,Windows Phone 7.5,5,Windows Phone 8,9,Windows Phone 8.1,1,Windows Phone Apps,1,Windows Phone Mango,3,Windows Phone SDK,1,Windows Server,5,Windows Server 2012,2,Windows Server 2016,2,Windows Server 2019,1,Windows Server 8,1,Windows Vista,5,Windows XP,6,Wireless,4,Wordpress,44,Wordpress Plugins,4,Wordpress Themes,5,WWDC,52,Xbox,6,Xbox 360,6,Xbox One,3,Xcode,80,Xiaomi,8,Yahoo,9,Yalu,3,YouTube,11,Zong,1,ZTE,1,Zune,2,Zynga,1,
ltr
item
TechGlobeX: Network Transmission Media Types & Protection against DDOS
Network Transmission Media Types & Protection against DDOS
https://4.bp.blogspot.com/-lFwoE28LrI8/XLCqjLM7oMI/AAAAAAAAPFE/UBcExZXveYkBg9zrW4wXccCIQlZ6oJwdQCLcBGAs/s1600/Network%2BTransmission%2BMedia%2BTypes%2B%2526%2BProtection%2Bagainst%2BDDOS.jpg
https://4.bp.blogspot.com/-lFwoE28LrI8/XLCqjLM7oMI/AAAAAAAAPFE/UBcExZXveYkBg9zrW4wXccCIQlZ6oJwdQCLcBGAs/s72-c/Network%2BTransmission%2BMedia%2BTypes%2B%2526%2BProtection%2Bagainst%2BDDOS.jpg
TechGlobeX
https://www.techglobex.net/2019/04/network-transmission-media-types.html
https://www.techglobex.net/
https://www.techglobex.net/
https://www.techglobex.net/2019/04/network-transmission-media-types.html
true
6015647009126982431
UTF-8
Loaded All Posts Not Found Any Posts VIEW ALL Read More Reply Cancel Reply Delete By Home PAGES POSTS View All RELATED ARTICLES: TOPIC ARCHIVE SEARCH ALL POSTS Not Found Any Post Match With Your Request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Just Now 1 Minute Ago $$1$$ minutes ago 1 Hour Ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago More Than 5 Weeks Ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share To A Social Network STEP 2: Click The Link On Your Social Network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy