The world is becoming increasingly connected electronically, expanding markets and reducing the inefficiencies of doing business across borders. Services can be hosted anywhere and customers can be served from anywhere. Emerging market territories often lack proper client control, however, and malware infection rates are high. When these malware clients are directed by centralized command-and-control servers, they become “botnets.” The sheer number of client machines involved in botnets provides enormous load-generation capacity that can be rented cheaply by any party with an interest in disrupting service. Today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often all at the same time.
Through DDoS attacks have been with us for decades, the scope, nature, and magnitude of the DDoS threat spectrum have evolved significantly.
Sponsored by F5 Networks
Enter your email address.
If you are a new user, select “I don’t have a password” and hit submit. You will be taken to a short registration form.
If you are a returning user, enter your password (or click on "forgot your password").
Can't register? Check out the answers to our Frequently Asked Questions.