Tagged articles
55 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Oct 9, 2025 · Information Security

Master DDoS Defense: Linux Traffic Scrubbing & Rate Limiting Strategies

This article shares a hands‑on, production‑tested DDoS mitigation guide that covers real‑world attack analysis, layered defense architecture, Linux kernel‑level traffic cleaning with iptables and tc, Nginx + Lua application‑layer protection, automated monitoring, performance tuning, and future trends.

DDoSLinuxiptables
0 likes · 11 min read
Master DDoS Defense: Linux Traffic Scrubbing & Rate Limiting Strategies
IT Services Circle
IT Services Circle
Oct 3, 2025 · Product Management

Why Meta’s Smart‑Glasses Demo Crashed: Inside the DDoS and Race‑Condition Nightmares

At Meta Connect 2025, Meta's ambitious showcase of three new smart glasses and a neural wristband backfired with two high‑profile demo failures—one caused by a self‑inflicted DDoS from simultaneous device requests and the other by a race‑condition bug that put the HUD to sleep—turning a potential breakthrough into a public embarrassment.

AIDDoSMeta
0 likes · 8 min read
Why Meta’s Smart‑Glasses Demo Crashed: Inside the DDoS and Race‑Condition Nightmares
Tencent Technical Engineering
Tencent Technical Engineering
Sep 22, 2025 · Information Security

Inside the RapperBot DDoS Botnet: Anatomy, Attack Tactics, and Defense Strategies

An in‑depth investigation reveals the rise and takedown of the RapperBot DDoS botnet, detailing its malware lineage, sample analysis, sophisticated attack techniques, criminal profit models, and practical security recommendations, while showcasing Tencent’s Zeus Shield intelligence platform and AI‑enhanced threat analysis.

BotnetDDoScybersecurity
0 likes · 11 min read
Inside the RapperBot DDoS Botnet: Anatomy, Attack Tactics, and Defense Strategies
Cognitive Technology Team
Cognitive Technology Team
Aug 24, 2025 · Information Security

How DoS Attacks Work and How to Defend Against Them

This article explains what denial‑of‑service (DoS) attacks are, describes their underlying principles and common variants such as SYN, UDP, ICMP, and HTTP floods, and outlines comprehensive defense strategies including firewalls, IDS, CDN, multi‑active architectures, SYN cookies, rate limiting, and cloud‑based protection services.

DDoSDefense StrategiesDenial of Service
0 likes · 9 min read
How DoS Attacks Work and How to Defend Against Them
Su San Talks Tech
Su San Talks Tech
Jun 12, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting, and Dynamic Rules

This article explains why a million‑QPS flood can cripple systems, outlines attackers' tactics, and presents a three‑layer defense strategy—including gateway rate limiting with Nginx + Lua, distributed circuit breaking via Sentinel, device fingerprinting, behavior analysis, and a dynamic rule engine—to protect high‑traffic services.

DDoSbehavior analysishigh QPS
0 likes · 14 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting, and Dynamic Rules
Open Source Linux
Open Source Linux
May 23, 2024 · Information Security

Master Common Web & Network Attacks: SQL Injection, XSS, CSRF, DDoS & More

This article provides a comprehensive overview of prevalent web and network security threats—including SQL injection, XSS, CSRF, file‑upload flaws, DDoS, ARP/RARP spoofing, DNS attacks, routing protocols, TCP/UDP differences, HTTP nuances, cookies vs. sessions, and SSL/TLS—along with practical prevention techniques for each.

ARPCSRFDDoS
0 likes · 24 min read
Master Common Web & Network Attacks: SQL Injection, XSS, CSRF, DDoS & More
Java Tech Enthusiast
Java Tech Enthusiast
Jan 21, 2024 · Information Security

Security Risks of Exposing Your Public IP Address

Exposing your public IP address can invite DDoS floods, vulnerability scanning, privacy breaches, and targeted phishing or malware attacks, so you should protect it with firewalls, regular updates, secure VPN connections, and by avoiding public disclosure on social platforms.

DDoSPublic IPfirewall
0 likes · 3 min read
Security Risks of Exposing Your Public IP Address
vivo Internet Technology
vivo Internet Technology
Oct 31, 2023 · Information Security

Network Port Security: Risks, Attack Methods, and Governance Practices

Network port security demands continuous discovery, automated vulnerability scanning, traffic‑baseline anomaly detection, and disciplined governance—including source authentication, first‑packet drop, and lifecycle management—to mitigate DDoS, application‑layer, and exploitation attacks while ensuring minimal‑privilege openings and timely closure.

CC AttackDDoSVulnerability Management
0 likes · 25 min read
Network Port Security: Risks, Attack Methods, and Governance Practices
php Courses
php Courses
Aug 6, 2023 · Information Security

Common Web Attack Types and Their Mitigation Strategies

This article outlines the most common web attacks—including DDoS, XSS, SQL injection, and CSRF—explains how they compromise website security, and provides practical mitigation techniques such as traffic filtering, input validation, parameterized queries, CSRF tokens, and secure configuration to protect sites and user data.

CSRFDDoSMitigation
0 likes · 10 min read
Common Web Attack Types and Their Mitigation Strategies
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2023 · Information Security

Top 10 Website Security Threats & How to Defend Your Site

This article examines the ten most common website security attacks—from XSS and SQL injection to DDoS and phishing—explaining their motivations, mechanisms, and practical mitigation strategies such as WAF deployment, input sanitization, SSL encryption, and regular updates to help protect any online presence.

DDoSMitigationSSL
0 likes · 14 min read
Top 10 Website Security Threats & How to Defend Your Site
MaGe Linux Operations
MaGe Linux Operations
Feb 15, 2023 · Information Security

Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases

This article explores the fundamentals and varieties of DoS and DDoS attacks, explains how special‑crafted packets, floods, SYN, UDP, and reflection/amplification methods work, and illustrates real‑world hacker groups such as DD4BC, Armada Collective, Fancy Bear, and their ransom tactics.

DDoSDoScybercrime
0 likes · 12 min read
Unveiling DoS/DDoS Attacks: Techniques, Exploits, and Real Hacker Cases
UCloud Tech
UCloud Tech
Dec 8, 2022 · Information Security

How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies

This article examines a recent 1.2 Tbps DDoS assault on a major UCloud client, detailing the attack timeline, mixed flood and connection‑exhaustion techniques, geographic and device source distribution, and UCloud’s comprehensive mitigation strategies and best‑practice recommendations for robust information security.

Cloud ProtectionDDoSIoT security
0 likes · 7 min read
How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Oct 16, 2022 · Information Security

Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report

The 2022 H1 Radware report reveals a 203% rise in malicious DDoS attacks, a shift from pandemic‑related threats to patriotic hacker activity driven by the Russia‑Ukraine conflict, record‑size attacks, resurging RDoS ransomware, and retail and high‑tech sectors emerging as top targets.

2022 trendsDDoSnetwork attacks
0 likes · 5 min read
Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report
Open Source Linux
Open Source Linux
Oct 9, 2022 · Information Security

What Is a DDoS Attack? Understanding Types, Motives, and Trends

This article explains the fundamentals of Distributed Denial of Service attacks, covering their definition, key characteristics, common motivations, classification by technique and protocol layer, current attack statistics, target industries, and emerging trends shaping the future of DDoS threats.

Cyber AttacksDDoSDistributed Denial of Service
0 likes · 14 min read
What Is a DDoS Attack? Understanding Types, Motives, and Trends
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Overview of Common Information Security Techniques: Network, System, and Cryptography

This article provides a comprehensive overview of essential information security technologies, covering network attacks such as SQL injection, XSS, CSRF, DDoS, DNS and TCP hijacking, system vulnerabilities like stack overflow and privilege escalation, and core cryptographic concepts including symmetric/asymmetric encryption, key exchange, hashing, encoding, and multi‑factor authentication.

DDoSDNS hijackingSQL injection
0 likes · 23 min read
Overview of Common Information Security Techniques: Network, System, and Cryptography
21CTO
21CTO
Mar 7, 2022 · Information Security

How ICANN’s Neutral Stance Shapes the Russia‑Ukraine Cyber Conflict

Amid sanctions, Russia shifted all domestic sites to the .ru domain while Ukraine appealed to ICANN to sever Russia’s internet ties, prompting a neutral refusal, a surge of Anonymous‑led cyber attacks, DDoS assaults on the .ru TLD, and broader internet restrictions.

DDoSDomain NamesICANN
0 likes · 5 min read
How ICANN’s Neutral Stance Shapes the Russia‑Ukraine Cyber Conflict
21CTO
21CTO
Jan 22, 2022 · Information Security

What’s Driving the Surge of Linux‑Based IoT Malware in 2021?

The article examines how the proliferation of Linux‑powered IoT devices has made them prime targets for malware families like XorDDoS, Mirai and Mozi, highlighting their rapid growth, attack techniques, and recommended defensive measures for operators.

BotnetDDoSIoT security
0 likes · 8 min read
What’s Driving the Surge of Linux‑Based IoT Malware in 2021?
Open Source Linux
Open Source Linux
Sep 12, 2021 · Information Security

Understanding DDoS Attacks: Risks, Trends, and Prevention Strategies

This article explains what DDoS attacks are, outlines their severe business, reputation, and data‑leakage impacts, highlights recent growth trends, and offers practical prevention measures such as bandwidth scaling and professional high‑defense services.

Attack MitigationDDoScybersecurity
0 likes · 6 min read
Understanding DDoS Attacks: Risks, Trends, and Prevention Strategies
Liangxu Linux
Liangxu Linux
May 5, 2021 · Information Security

Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM

This guide reviews the most frequent TCP/IP attacks—including IP spoofing, SYN flooding, UDP flooding, TCP reset hijacking, man‑in‑the‑middle, and DDoS—explains their underlying protocols, demonstrates practical exploitation with Python/Scapy and Netcat, and outlines mitigation techniques and cryptographic fundamentals.

DDoSMITMPython
0 likes · 27 min read
Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM
dbaplus Community
dbaplus Community
Jan 7, 2021 · Information Security

Understanding CC Attacks and Slow DDoS: Mechanisms, Tools, and Defenses

This article explains how CC (Challenge Collapsar) attacks and their slow‑request variants overwhelm web services, describes the underlying botnet concepts, shows practical attack commands with tools like slowhttptest, and outlines multiple mitigation strategies such as rate limiting, IP hiding, high‑protection IP services, and static page optimization.

BotnetCC AttackDDoS
0 likes · 18 min read
Understanding CC Attacks and Slow DDoS: Mechanisms, Tools, and Defenses
Tencent Cloud Developer
Tencent Cloud Developer
Oct 12, 2020 · Information Security

Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions

The article explains DDoS attack fundamentals, illustrates escalating real‑world incidents and their mitigation, and compares Tencent Cloud’s free, high‑defense package, and high‑defense IP solutions, guiding readers on selecting appropriate protection based on attack history, bandwidth needs, and budget constraints.

Case StudyCloud ProtectionDDoS
0 likes · 9 min read
Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions
UCloud Tech
UCloud Tech
Mar 10, 2020 · Information Security

How a Game Company Defeated a 300G DDoS Ransom Attack with Cloud Defense

A Chinese game studio faced a massive 300 GB DDoS ransom attack, refused to pay, and, with UCloud's elastic high‑availability and Anycast cleaning technologies, repelled the assault while detailing the attackers' methods and offering a public‑cloud DDoS mitigation guide.

AnycastDDoSGame Industry
0 likes · 8 min read
How a Game Company Defeated a 300G DDoS Ransom Attack with Cloud Defense
UCloud Tech
UCloud Tech
Sep 9, 2019 · Information Security

How Anycast Transforms DDoS Defense: From Detection to Global Traffic Dilution

This article explains the evolution of DDoS protection from early router‑based defenses to modern cloud‑native solutions, detailing UCloud's three‑module architecture, the role of Anycast in traffic dilution, and practical features that enable scalable, cost‑effective mitigation of large‑scale attacks.

AnycastDDoSNetwork Protection
0 likes · 9 min read
How Anycast Transforms DDoS Defense: From Detection to Global Traffic Dilution
Tencent Cloud Developer
Tencent Cloud Developer
May 10, 2019 · Information Security

Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies

The paper examines novel TCP reflection DDoS methods that exploit CDN IP ranges and increasingly use pure ACK responses, outlines their handshake‑state behavior, and proposes a per‑connection tracking defense algorithm—implemented in Tencent’s DaYu platform—to detect and mitigate SYN/ACK, ACK, and RST reflection flows without affecting legitimate traffic.

DDoSTCP reflectiondefense algorithm
0 likes · 10 min read
Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Jul 4, 2018 · Information Security

2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations

In the first half of 2018, the gaming industry faced a dramatic rise in DDoS attacks—accounting for nearly 40% of incidents and reaching a 1.23 Tbps peak on Tencent Cloud—driven largely by UDP‑based and MEMCACHED reflection floods, prompting comprehensive mitigation strategies such as BGP high‑defense, traffic filtering, and industry‑specific protections.

Attack TrendsDDoSGaming Industry
0 likes · 15 min read
2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations
Tencent Cloud Developer
Tencent Cloud Developer
Jun 13, 2018 · Information Security

Analysis of DDoS Attack Trends in the First Half of 2018

In the first half of 2018 DDoS attacks surged, with IoT‑based SSDP and newly dominant Memcached reflection amplifications reaching 1.7 Tbps, gaming becoming the top‑targeted sector, SYN and HTTP floods rising, attack infrastructure shifting abroad, and automated, low‑cost services enabling teenage operators, prompting recommendations for high‑bandwidth cloud and BGP defenses.

Attack TrendsDDoSThreat analysis
0 likes · 13 min read
Analysis of DDoS Attack Trends in the First Half of 2018
ITPUB
ITPUB
May 24, 2018 · Information Security

How Attackers Exploit UPnP to Bypass DDoS Defenses with Obfuscated Source Ports

Recent DDoS campaigns are using UPnP protocol flaws to hide source‑port information, allowing amplification attacks such as DNS spoofing to evade traditional defenses by routing traffic through compromised IoT routers and manipulating port‑forwarding rules via SOAP requests.

Amplification AttackDDoSPort Obfuscation
0 likes · 6 min read
How Attackers Exploit UPnP to Bypass DDoS Defenses with Obfuscated Source Ports
Tencent Cloud Developer
Tencent Cloud Developer
May 17, 2018 · Information Security

Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud

On April 8, a record‑breaking 1.23 Tbps DDoS attack—dominated by SSDP reflection and launched by roughly 166 000 mostly Chinese sources, including PCs, IDC servers and IoT devices—targeted a Tencent Cloud‑hosted game, prompting the article to urge operators to assess risk, adopt high‑protection services, conceal origin IPs, and tailor defense policies with expert assistance.

DDoSDefense StrategiesGame Security
0 likes · 7 min read
Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud
Tencent Cloud Developer
Tencent Cloud Developer
May 14, 2018 · Information Security

Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services

Tencent Cloud mitigated a 31‑minute, 194 Gbps hybrid DDoS attack on a cloud gaming service that combined typical SYN/ICMP floods with a rare TCP‑reflection component sending spoofed SYN/ACK packets to common service ports, primarily from Chinese IDC servers, prompting advanced filtering and cloud‑based mitigation recommendations.

DDoSGamingTCP reflection
0 likes · 10 min read
Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services
Tencent Cloud Developer
Tencent Cloud Developer
Mar 7, 2018 · Information Security

Memcached Reflection DDoS Attacks Set New Traffic Records

Memcached reflection DDoS attacks have surged, breaking terabit‑per‑second records with peaks of 1.35 Tbps and 1.94 Tbps, prompting warnings from Cloudflare and Arbor, targeting online services worldwide, while Tencent Cloud’s Zeus Shield mitigated the traffic and experts advise stronger UDP monitoring, high‑capacity defenses, and regular simulations.

AmplificationDDoSMemcached
0 likes · 7 min read
Memcached Reflection DDoS Attacks Set New Traffic Records
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 21, 2017 · Information Security

Smart Intelligent Defense and Big Data Capabilities in Alibaba's Self‑Developed High‑Performance Anti‑Attack Product

The article describes Alibaba's smart defense model that uses real‑time traffic analysis and big‑data insights to automatically adjust DDoS mitigation strategies, outlines the system's capabilities such as attacker identification and traffic quantification, and discusses future challenges in handling increasingly complex and large‑scale attacks.

AlibabaAnti-DDoSDDoS
0 likes · 5 min read
Smart Intelligent Defense and Big Data Capabilities in Alibaba's Self‑Developed High‑Performance Anti‑Attack Product
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 17, 2017 · Information Security

Alibaba's Self‑Developed High‑Performance DDoS Defense Product AliGuard: Development History, Architecture, and Capabilities

This article reviews the 2016 Dyn DDoS incident, explains why DDoS attacks remain a critical security challenge, and details Alibaba's internally built high‑performance DDoS mitigation solution AliGuard, covering its development timeline, multi‑user architecture, scalability from 40 Gbps to over 400 Gbps, and deployment models.

AliGuardAlibabaDDoS
0 likes · 9 min read
Alibaba's Self‑Developed High‑Performance DDoS Defense Product AliGuard: Development History, Architecture, and Capabilities
Efficient Ops
Efficient Ops
Mar 5, 2017 · Operations

Surviving Hundred‑Billion Transactions: Real Production Incident Stories

This article recounts a series of real‑world production incidents—including massive concurrency overloads, DDoS attacks, SQL injection breaches, and critical bugs—encountered by an internet finance platform, and shares the concrete technical fixes and lessons learned to improve system resilience.

DDoSSQL injectionhigh concurrency
0 likes · 22 min read
Surviving Hundred‑Billion Transactions: Real Production Incident Stories
MaGe Linux Operations
MaGe Linux Operations
Nov 7, 2016 · Information Security

Why Banks Stay Silent on DDoS Attacks and How to Build Robust Defenses

The article examines why financial institutions keep DDoS incidents under wraps, shares insights from senior security officers, and outlines six practical strategies—including real‑time defense preparation, upstream mitigation, application‑layer protection, collaboration, emergency planning, and vigilance against secondary attacks—to strengthen resilience against increasingly sophisticated distributed denial‑of‑service threats.

BankingCyber DefenseDDoS
0 likes · 10 min read
Why Banks Stay Silent on DDoS Attacks and How to Build Robust Defenses
MaGe Linux Operations
MaGe Linux Operations
Oct 31, 2016 · Information Security

What Is DDoS? Exploring Types, Mechanisms, and Prevention

This article explains what DDoS attacks are, outlines their main categories—including high‑volume floods, TCP state‑exhaustion attacks, and application‑layer assaults—describes how each operates, and highlights why modern DDoS threats have shifted toward sophisticated application‑level techniques.

Application LayerCyber AttackDDoS
0 likes · 4 min read
What Is DDoS? Exploring Types, Mechanisms, and Prevention
Architecture Digest
Architecture Digest
Apr 1, 2016 · Information Security

Understanding DDoS: A Resource War, Emerging Trends, and Defense Strategies

The article explains what Distributed Denial of Service (DDoS) attacks are, why they are a persistent resource‑war in cyberspace, outlines new hybrid attack trends, the expanding range of compromised devices, and discusses evolving defense approaches from local cleaning to cloud‑based anti‑DDoS services.

Anti-DDoSAttack TrendsDDoS
0 likes · 11 min read
Understanding DDoS: A Resource War, Emerging Trends, and Defense Strategies
Java High-Performance Architecture
Java High-Performance Architecture
Jan 24, 2016 · Information Security

What Is a CC Attack and How to Defend Against It?

CC attacks, a variant of DDoS that exploits legitimate web requests via proxies, overwhelm servers by forcing intensive URL processing; this article explains their mechanics, differences from traditional DDoS, and outlines practical defenses such as cloud WAFs, IP analysis, static content, and connection‑rate limiting.

CC AttackCloud WAFDDoS
0 likes · 6 min read
What Is a CC Attack and How to Defend Against It?
Architect
Architect
Nov 5, 2015 · Information Security

Comprehensive Overview of DDoS Attack Types and Multi‑Layer Defense Strategies

This article provides a detailed classification of DDoS attacks—including network‑layer, application‑layer, hybrid, reflection, pulse, and link‑flooding methods—and outlines a four‑layer defense architecture (ISP/WAN, CDN/Internet, Data‑Center, OS/APP) along with practical mitigation techniques and considerations for different enterprise sizes.

Attack TypesDDoSDefense Strategies
0 likes · 24 min read
Comprehensive Overview of DDoS Attack Types and Multi‑Layer Defense Strategies
21CTO
21CTO
Oct 1, 2015 · Information Security

Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly

This article explains what DDoS attacks are, highlights famous large‑scale incidents, examines their financial and reputational impact on businesses, and outlines practical mitigation strategies that cloud providers and organizations can adopt to detect and survive such attacks.

DDoSDistributed Denial of ServiceMitigation
0 likes · 7 min read
Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly
Efficient Ops
Efficient Ops
Sep 22, 2015 · Information Security

How Tencent Cloud Defeats Massive DDoS Attacks in Seconds

This article explains how Tencent Cloud’s Dayu service mitigates large‑scale DDoS and CC attacks, using DNS redirection, traffic scrubbing nodes, and rapid 5‑second cleaning to keep services like Hammer Technology online during massive traffic spikes.

DDoSDNSTencent Cloud
0 likes · 10 min read
How Tencent Cloud Defeats Massive DDoS Attacks in Seconds
MaGe Linux Operations
MaGe Linux Operations
Sep 21, 2015 · Information Security

How ADS Turns the Tide Against DDoS Attacks: Real Cases and Detection Techniques

The article explains what DDoS attacks are, illustrates real incidents like the Hammer phone launch and Apple iPhone 6s pre‑order outage, and details how the ADS solution uses anti‑spoofing, protocol analysis, behavior profiling, dynamic fingerprinting, and bandwidth control to accurately identify and mitigate malicious traffic.

ADSDDoSTraffic analysis
0 likes · 5 min read
How ADS Turns the Tide Against DDoS Attacks: Real Cases and Detection Techniques
Architect
Architect
Jul 3, 2015 · Information Security

Evolution of DDoS Attacks and Mitigation Strategies

The article outlines the evolution of DDoS attacks from early botnet‑based floods to reflection attacks leveraging open servers and finally IoT‑device protocols like SSDP, explains their amplification mechanisms, presents statistical trends, and discusses comprehensive mitigation techniques including source verification, traffic shaping, ISP cooperation, CDN protection, and big‑data analytics.

BotnetDDoSIoT
0 likes · 11 min read
Evolution of DDoS Attacks and Mitigation Strategies
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 21, 2015 · Information Security

Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity

The article explains how malicious JavaScript can turn browsers into participants of DDoS attacks through techniques like server hijacking and man‑in‑the‑middle injection, and describes how HTTPS and the emerging Subresource Integrity feature can help protect websites from such threats.

DDoSHTTPSJavaScript
0 likes · 6 min read
Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity