- Large 38TB DDOS attack targeted the hosting provider
- Cloud Flair’s DDOS Protection kicked and stopped the attack
- It was the biggest Ddos attack ever
Distributed Decision (DDOS) attacks usually use a network of compromise devices to bomb an extraordinary large quantity of data server to be called unusable.
But Cloud Flair says it has recently stopped a memorable DDOS attack that tried to throw about 38 38TB worth of data in just 45 seconds – this is the largest attack in history.
For comparisons, 38TB 9,350 full -length HD films, or 9.35 million songs, or 7,480 hours of high -definition video downloading video.
You can like
Cloud Flair has stopped meg-DDOS
Cloud Flair said the attack resulted in 7.3 terabytes per second (TBPS) traffic targeting an average of 21,925 destination ports, with an IP address belonging to an unknown hosting provider.
The attack used UDP packets as a central attack vector to ‘flood’ the IP address with illegal packets, unable to serve it, which would make 99.9996 % of the attack.
The remaining 0.004 % of the attack is used and a combination of Lord attacks that bounce data on hunting and increase attacks, and increase flood attacks.
Some additional attacks automatically used an obsolete diagnostic tools to ‘ping’ IP IP address, which, when working, overloads the network’s ability to respond and increase network traffic.
The DDOS attack began from 161 countries, with traffic began with half traffic coming from IP addresses in Brazil and Vietnam.
Cloud Flair said Taiwan, China, Indonesia, Ukraine, Ecuador, Thailand, the United States and Saudi Arabia were detected.
This, this, this, can find the attack like a very integrated effort by a highly organized group that spreads over the world, but most of the devices used in fact are compromised with Internet -connected devices that are affected by malware, and turn this device into a ‘boot’.
Hackers will use fishing, malicious downloads, or weaknesses to spread malware, will continue to work with the infection device until it is demanded to participate in an attack.
In the attack, 45,097 unique source IP addresses came to the address per second, an average of 26,855 for the attack period. To counter the attack, Cloud Flair said it had used the DDOS attack distributed nature to spread traffic burden in data centers from where traffic was starting.
Cloud flight DDOS detection and reduction systems also detect suspicious packets and ‘fingerprint’, which allows the system to identify the similarities in the attack packets and reduce them without affecting legitimate traffic.


