BrandPost: Why Bad Actors Target VPNs, and What Can Be Done to Stop Attacks

This article has been indexed from CSO Online

It seems as if each day brings more harrowing stories about DDoS attacks that have been waged against enterprises, with each attack seemingly lasting longer and costing more than the ones before. There’s almost a tendency to view the bad actors who wage these DDoS attacks as masterminds of new technology and strategies for bringing down the networks of global enterprises.

In reality, however, many of the DDoS attacks waged against enterprises target components that have long been a part of the network—things such as virtual private network (VPN) devices, firewalls, load balancers and other edge devices. Such devices contain state information used to route and manage traffic. This makes them susceptible to DDoS attacks. More specifically, state exhaustion DDoS attacks which are designed to fill finite sized state tables with illegitimate connections – ultimately denying legitimate connections access to the services behind them.

To read this article in full, please click here

Read the original article: BrandPost: Why Bad Actors Target VPNs, and What Can Be Done to Stop Attacks