The Security Strategist

DDoS Demystified: Understanding the Threat


Listen Later

Takeaways
  • #DDoS can mimic legitimate traffic, making detection difficult.
  • #Botnets are often created from compromised IoT devices.
  • Motivations for DDoS attacks range from hacktivism to personal grievances.
  • Residential IP proxy networks complicate DDoS defense.
  • #AI is increasingly being used in both attacks and defenses.
  • The future of cybersecurity will require AI-assisted solutions.
  • Organisations must understand their traffic to defend effectively.

Summary

In this episode of The Security Strategist podcast, host Keyari Page leads an engaging conversation with David Warburton, Director of Threat Research at F5 Labs, focusing on Distributed Denial of Service (DDoS) attacks.

DDoS attacks are “one of the oldest cybersecurity attacks”. It’s an attempt to incapacitate a network, server, or website by overwhelming it with huge amounts of traffic.

However, despite their long history, DDoS attacks remain a significant problem. This is due to the fact that they “look like really popular, busy websites” which can lead to legitimate traffic being generated.

Warburton explains that they could be employed for a number of reasons, such as hacktivism, gaming-related conflicts, and geopolitical manipulation. A key example is of a Russian operation which used a digital attack to mimic a French protest against pension reform. This spread disinformation and created real world tension.

Tune into the latest episode to hear Warburton’s advice to businesses on tackling DDoS attacks.

For the latest tech insights visit: EM360Tech.com

...more
View all episodesView all episodes
Download on the App Store

The Security StrategistBy EM360Tech


More shows like The Security Strategist

View all
Conversations with Tyler by Mercatus Center at George Mason University

Conversations with Tyler

2,392 Listeners

The Daily by The New York Times

The Daily

111,827 Listeners