MAC Address

Post category:#General Terms

A unique identifier of an individual network equipment unit, such as a NIC or Ethernet port, designating a sender or a recipient of an OSI network-level packet (frame). Usually MAC addresses are assigned by a manufacturer while producing equipment or components.

Read moreMAC Address

Data Center

Post category:#General Terms

Data center (DPC) is a multi-level storage for network and server equipment. Choosing a data center is based on the following points: reputation, reliability, location, etc.

Read moreData Center

VoIP Flood

Post category:#Attacks

A DoS attack, a variant of UDP flood implemented by sending large amounts of forged VoIP packets from a wide range of IP addresses to a VoIP server, usually used by a call center. As a result, the server wastes too much of its resources trying to handle the bogus requests. Due to some aspects of UDP protocol, a VoIP flood attack can be very hard to detect.

Read moreVoIP Flood

MS SQL Reflection DDoS Attack

Post category:#Attacks

An attack type that exploits vulnerabilities of the MC-SQLR protocol used for sending queries to Microsoft SQL Server. An overload of a victim’s link is achieved as a result of getting lists of all database instances stored on multiple public SQL servers (including those hosted by service and cloud providers), along with the information on how to connect to those instances. The data is provided in response to a stream of spoofed scripted requests containing the attacked node’s IP address, sent to those SQL servers.

Read moreMS SQL Reflection DDoS Attack