{"id":3584,"date":"2016-10-01T17:23:53","date_gmt":"2016-10-01T21:23:53","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3584"},"modified":"2016-10-02T18:01:42","modified_gmt":"2016-10-02T22:01:42","slug":"krebs-back-online-after-massive-ddos","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/01\/krebs-back-online-after-massive-ddos\/","title":{"rendered":"Krebs back online after massive DDoS"},"content":{"rendered":"<p>After KrebsOnSecurity covered vDOS for being a DDOS hack seller their site was hit with a historic DDOS. While DDOS mitigation has been discussed previously, this attack was nearly impossible to stop. The site was given pro-bono access to Akamai&#8217;s mitigation service but due to the size of the attack, Akamai had to sever ties. They predicted that protection of this one site would&#8217;ve cost millions of dollars and disruptive protection of their other clients. \u00a0Diagnosis of the DDOS shows that a lot of attacks came from compromised IoT (internet of things) enabled devices. It was also the second largest DDOS that Akamai ever dealt with.<\/p>\n<p>Google has stepped in with a new program called Google Shield. Its purpose is to prevent free speech from being silenced by malicious attackers. \u00a0Google Shield protects news As this case proved it is cost-prohibitive to protect a small site from attacks so Google is trying to provide backup. \u00a0Protection at a high level can cost $150,000 to $200,000 a year even if it is just a blog. \u00a0The author fears of state sponsored actors also using this kind of DDOS power on individuals.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After KrebsOnSecurity covered vDOS for being a DDOS hack seller their site was hit with a historic DDOS. While DDOS mitigation has been discussed previously, this attack was nearly impossible to stop. The site was given pro-bono access to Akamai&#8217;s mitigation service but due to the size of the attack, Akamai had to sever ties. [&hellip;]<\/p>\n","protected":false},"author":9137,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715709],"tags":[],"class_list":{"0":"post-3584","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-05it-strategy","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/9137"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3584"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3584\/revisions"}],"predecessor-version":[{"id":3600,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3584\/revisions\/3600"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}