logo

Memcached DDoS Attack - Computer Security

   

Added on  2023-04-22

4 Pages505 Words492 Views
Running head: COMPUTER SECURITY
MEMCACHED DDOS ATTACK - COMPUTER SECURITY
Name of the Student
Name of the University
Author Note

1COMPUTER SECURITY
Memcached DDoS attack
Memcached is the latest DDoS attack faced by the cyber world. This has become one of the
most powerful weapon used for performing cybercrimes. Memcached is used to reduce the database
load speeds up web application. This is in the form of memory object caching system. Moreover
100,000 Memcached servers are exposed without proper authentication (Bhuyan, Bhattacharyya &
Kalita, 2015). At the mid of March these attack took place and this was the most powerful attack in
the history with around 1.35 terabytes of traffic hitting the GitHub that is the collaborative platform.
After the configuration of Mmeacached server, the criminals took the advantage of the vulnerability
and started launching several attacks by making this server as base server.
Way attack conducted
The Memcached exposed without protection allowed several criminals to get access sever the
servers and using them to deliver large data sets. The attackers used this servers as base to attack on
target. They spoofed the IP address of victims after this the attackers sent large data packet towards
the Memcached servers. This data packet offers faster and direct response. Hence this lead to creation
of large internet traffic within the server of the victim ((Bhuyan, Bhattacharyya & Kalita, 2015). The
huge amount of data delivered to the victims system lead to a reason of outage. This attack was
effective because it was easy to perform and is enough to paralyze the system. The reason behind
becoming one of the major attacks is that it had given an easy access towards the attackers.
Preventing the server from DDoS attacks
With the implementation of proper measures and tools these attacks can be neutralized.
Moreover proper monitoring should be done on the organization’s network (Singh, 2018). This will
help the organization to identify ad rectify the problem. In order to monitor the activities and traffic
Adaptive Defense 360 can be installed within the server for detailed visibility of every activity. Apart
from this in order to prevent the attack deactivation of Memcached server can help in providing
proper protection and will also help in amplification.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Distributed Denial of Service
|10
|2237
|162

Memcrashed Exploit: Description, Solutions, and Future Importance
|11
|2518
|404

Computer Security: Memcrashed Exploit and Solutions
|14
|3281
|184

Contemporary Cyber Security Issues
|11
|2056
|79

Hackers Without Borders: A Legal Response
|11
|2715
|251

Computer Security: DDoS Attacks
|11
|2444
|233