Defending Against Black Nurse DoS Attacks

Denial-of-service (DoS) attacks are a popular way to cause targeted service disruptions, typically for extended periods of time. The relative ease and low cost of launching such attacks, aided by a serious lack of any viable defense mechanisms, have made them one of the most common threats on the Internet. In the past, Internet Control Message Protocol (ICMP)-based DoS attacks have used multiple hosts infected with botnets to launch an overwhelming distributed DoS (DDoS) attack to take down major Web servers or perimeter firewalls. Now, researchers have discovered a new attack technique, called “Black Nurse,” that enables a single computer to generate 15 Mbps of bandwidth traffic and take down major network firewalls.

Spotlight

CyberGym

Make the world your training field. CyberGym® offers end-to-end, human-centered cybersecurity training and defense solutions, over WCWA (World Cyber Warfare Arena), a networked platform of legacy emulation arenas, knowledge share and qualification services. Our renowned offering serves governmental and private organizations around the world, with specifically tailored hands-on training programs and complementary services, backed by in-house elite security experts and hackers.

OTHER WHITEPAPERS
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

2022 Global Cybersecurity Awareness Training Study

whitePaper | August 31, 2022

The benefit awareness cybersecurity awareness training, particular phishing simulations, have gained wide acceptance in business and the public sector.

Read More
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | December 28, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face.

Read More
news image

Dell VxRail: Comprehensive Security by Design

whitePaper | September 29, 2022

In today’s world, business organizations and individuals have become accustomed to accessing the information they need 24 hours a day, seven days a week, often within seconds of making a request. To illustrate, an ad marketing study conducted by Google found that 53% of website sessions are terminated if pages take longer than three seconds to load.

Read More
news image

FortiClient Data Sheet

whitePaper | July 12, 2023

FortiClient’s Fortinet Security Fabric integration provides endpoint visibility through telemetry and ensures that all Security Fabric components – FortiGate, FortiAnalyzer, EMS, managed APs, managed Switches, and FortiSandbox – have a unified view of endpoints in order to provide tracking and awareness, compliance enforcement, and reporting. Traditional virtual private network (VPN) tunnels or new, automatic ZTNA tunnels provide secure remote connectivity. Provide security and protection for endpoints when local or remote.

Read More
news image

X-Force Threat Intelligence Index 2022

whitePaper | September 12, 2022

The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Read More

Spotlight

CyberGym

Make the world your training field. CyberGym® offers end-to-end, human-centered cybersecurity training and defense solutions, over WCWA (World Cyber Warfare Arena), a networked platform of legacy emulation arenas, knowledge share and qualification services. Our renowned offering serves governmental and private organizations around the world, with specifically tailored hands-on training programs and complementary services, backed by in-house elite security experts and hackers.

Events