Tagged articles
3 articles
Page 1 of 1
vivo Internet Technology
vivo Internet Technology
Oct 31, 2023 · Information Security

Network Port Security: Risks, Attack Methods, and Governance Practices

Network port security demands continuous discovery, automated vulnerability scanning, traffic‑baseline anomaly detection, and disciplined governance—including source authentication, first‑packet drop, and lifecycle management—to mitigate DDoS, application‑layer, and exploitation attacks while ensuring minimal‑privilege openings and timely closure.

CC AttackDDoSVulnerability Management
0 likes · 25 min read
Network Port Security: Risks, Attack Methods, and Governance Practices
dbaplus Community
dbaplus Community
Jan 7, 2021 · Information Security

Understanding CC Attacks and Slow DDoS: Mechanisms, Tools, and Defenses

This article explains how CC (Challenge Collapsar) attacks and their slow‑request variants overwhelm web services, describes the underlying botnet concepts, shows practical attack commands with tools like slowhttptest, and outlines multiple mitigation strategies such as rate limiting, IP hiding, high‑protection IP services, and static page optimization.

BotnetCC AttackDDoS
0 likes · 18 min read
Understanding CC Attacks and Slow DDoS: Mechanisms, Tools, and Defenses
Java High-Performance Architecture
Java High-Performance Architecture
Jan 24, 2016 · Information Security

What Is a CC Attack and How to Defend Against It?

CC attacks, a variant of DDoS that exploits legitimate web requests via proxies, overwhelm servers by forcing intensive URL processing; this article explains their mechanics, differences from traditional DDoS, and outlines practical defenses such as cloud WAFs, IP analysis, static content, and connection‑rate limiting.

CC AttackCloud WAFDDoS
0 likes · 6 min read
What Is a CC Attack and How to Defend Against It?