DoS Attacks Find New Home on Solaris - Can Linux Be Far Away?
Source: SunWorld - The SunWorld Staff - Posted by LinuxSecurity.com Team   
Documentation SANS (Systems Administration, Networking and Security Insitute) a research and education organization dedicated to security announced recently that administrators of Sun Solaris machines should check their servers and workstations for one of several Distributed Denial of Service (DDoS) packages that . . . SANS (Systems Administration, Networking and Security Insitute) a research and education organization dedicated to security announced recently that administrators of Sun Solaris machines should check their servers and workstations for one of several Distributed Denial of Service (DDoS) packages that have been prolifterating across the Internet over the past several months.

These DDoS tools allow hostile parties to use penetrated and typically unaware hosts to launch DoS attacks against target machines and networks. The DDoS tools that are installed on the penetrated host machines are usually hidden from System Adminstrators through the use of cloacking utilities referred to as a rootkit.

One of the primary difference between DDos attacks and more standard DoS attacks is that the attacking user can coordinate multiple hacked machines to launch a concerted and unified attack against their target. This creates DoS attacks that are significantly greater in size than older standard DoS attacks.

Although the primary systems that have been targeted to host the DDoS software (and thus to act as attackers) have beeb Solaris boxes, Linux users should definately take note. It is reasonable to assume that DDoS packages and utilities will soon be avaible for Linux. Of course, even if such utilities are not commonly available for some period of time, there is still nothing to prevent Linux hosts and networks from being the target of DDoS attack.

The SunWorld staff have written an excellent article discussing some of the more common DDoS attacks as well as how Solaris administrators can help to keep their systems from being exploited.

Anyone who administrates or oversees a network connected to the Internet should be aware of the existence of DDoS attacks and should be concerned about how they can best protect themselves from them.

Read this full article at SunWorld - The SunWorld Staff

Only registered users can write comments.
Please login or register.

Powered by AkoComment!