<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DDoS attacks Archives - Tarheel Media Digital Marketing</title>
	<atom:link href="https://tarheel.media/tag/ddos-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://tarheel.media/tag/ddos-attacks/</link>
	<description>Digital Marketing The Right Way</description>
	<lastBuildDate>Wed, 29 Oct 2025 21:55:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://tarheel.media/wp-content/uploads/2022/12/cropped-tarheel-icon-1-32x32.png</url>
	<title>DDoS attacks Archives - Tarheel Media Digital Marketing</title>
	<link>https://tarheel.media/tag/ddos-attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DDOS Attack on Web Ports</title>
		<link>https://tarheel.media/service-updates/2024/03/29/ddos-attack-on-web-ports/</link>
		
		<dc:creator><![CDATA[Mike W.]]></dc:creator>
		<pubDate>Fri, 29 Mar 2024 09:18:38 +0000</pubDate>
				<category><![CDATA[Service Updates]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[status closed]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=5868</guid>

					<description><![CDATA[<p>We are currently seeing a large DDOS attack this morning affecting multiple customer websites. DDOS stands for Distributed Denial of Service. Unlike a single-source DoS, a DDOS uses many source IPs at once, so blocking one address does not stop the attack. How this attack works These attacks do not require a server or network  [...]</p>
<p>The post <a href="https://tarheel.media/service-updates/2024/03/29/ddos-attack-on-web-ports/">DDOS Attack on Web Ports</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We are currently seeing a large DDOS attack this morning affecting multiple customer websites. DDOS stands for Distributed Denial of Service. Unlike a single-source DoS, a DDOS uses many source IPs at once, so blocking one address does not stop the attack.</p>
<h2>How this attack works</h2>
<p>These attacks do not require a server or network vulnerability. Attackers overwhelm resources with legitimate-looking requests to exhaust CPU, memory, connection slots, or packet-handling capacity. Imagine a PO box that receives so much bulk mail in one day the post office must start returning mail because there’s no room — that’s what a DDOS does to a server.</p>
<p>This is what tipped us off:</p>
<p><img data-dominant-color="fbfaf3" data-has-transparency="true" style="--dominant-color: #fbfaf3;" fetchpriority="high" decoding="async" class="alignnone size-full wp-image-5876 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1.png" alt="" width="580" height="646" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-200x223.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-269x300.png 269w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-400x446.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1-500x557.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-1.png 580w" sizes="(max-width: 580px) 100vw, 580px" /></p>
<h2>What we observed</h2>
<p>Typical VLAN traffic averages about 35 kbps. During the attack we saw interfaces stuck at 4+ Mbps, which is alarming even though the network can carry more than 10 Gbps. The problem here is packets-per-second that strain routers, not raw bandwidth. If we weren’t using octa-core routers and modern edge filters, some services would have dropped.</p>
<p><img data-dominant-color="f8f9f9" data-has-transparency="true" style="--dominant-color: #f8f9f9;" decoding="async" class="alignnone size-full wp-image-5870 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel.png" alt="" width="1708" height="993" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-200x116.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-300x174.png 300w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-400x233.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-500x291.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-600x349.png 600w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-700x407.png 700w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-768x447.png 768w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-800x465.png 800w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1024x595.png 1024w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1200x698.png 1200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1320x767.png 1320w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel-1536x893.png 1536w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-to-emmanuel.png 1708w" sizes="(max-width: 1708px) 100vw, 1708px" /></p>
<p>All traffic used user-agents reporting Mac 11 and Chrome 87, which we believe are forged. The bulk of requests originated from IP ranges in China, with occasional sources in the U.S., EU, and Russia. Right now they appear to be targeting an American Christian church site for bandwidth exhaustion.</p>
<p>On other sites, such as an office furniture site, attackers retried repeatedly over several hours to force downtime:</p>
<p><img data-dominant-color="f1f1f1" data-has-transparency="true" style="--dominant-color: #f1f1f1;" decoding="async" class="alignnone size-full wp-image-5871 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview.png" alt="" width="790" height="829" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-200x210.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-286x300.png 286w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-400x420.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-500x525.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-600x630.png 600w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-700x735.png 700w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview-768x806.png 768w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-china-overview.png 790w" sizes="(max-width: 790px) 100vw, 790px" /></p>
<h2>Mitigation status</h2>
<p>So far we have mitigated the attack and it has not grown in strength. We have seen short bursts since it began, but upstream filters and our edge rules have been effective.</p>
<p><img data-dominant-color="e6e9e7" data-has-transparency="true" style="--dominant-color: #e6e9e7;" decoding="async" class="alignnone size-full wp-image-5875 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2.png" alt="" width="1498" height="1176" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-200x157.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-300x236.png 300w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-400x314.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-500x393.png 500w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-600x471.png 600w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-700x550.png 700w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-768x603.png 768w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-800x628.png 800w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-1024x804.png 1024w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-1200x942.png 1200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2-1320x1036.png 1320w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-2.png 1498w" sizes="(max-width: 1498px) 100vw, 1498px" /></p>
<p>We have collected more than 11,000 IPs making blanket requests. As upstream providers apply filters, the attackers’ effectiveness drops and the attack eases.</p>
<p><img data-dominant-color="d8dadb" data-has-transparency="false" style="--dominant-color: #d8dadb;" decoding="async" class="alignnone size-full wp-image-5877 not-transparent" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3.png" alt="" width="336" height="1366" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3-74x300.png 74w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3-200x813.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3-252x1024.png 252w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-stats-3.png 336w" sizes="(max-width: 336px) 100vw, 336px" /></p>
<p>The attack pattern looks random across subnets and networks. It does not appear to target a specific site type beyond being U.S.-focused.</p>
<h3>UPDATES</h3>
<p><strong>5:46 am:</strong> Our upstream providers report this may form part of a larger campaign meant to strain United States internet infrastructure. They see similar attacks across many customers.</p>
<p><strong>5:52 am:</strong> We have almost entirely neutralized the initial DDOS surge.</p>
<p><img data-dominant-color="d8d9da" data-has-transparency="false" style="--dominant-color: #d8d9da;" decoding="async" class="alignnone size-full wp-image-5882 not-transparent" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1.png" alt="" width="369" height="1002" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1-110x300.png 110w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1-200x543.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-mitigation-1.png 369w" sizes="(max-width: 369px) 100vw, 369px" /></p>
<p><strong>11:00 am:</strong> Attackers shifted to Slowloris-style tactics, attempting to hold many slow connections and strain servers at the application layer. We adjusted timeouts and connection handling and again mitigated these attempts. The transition is visible below:</p>
<p><img data-dominant-color="ebe8df" data-has-transparency="true" style="--dominant-color: #ebe8df;" decoding="async" class="alignnone size-full wp-image-5902 has-transparency" src="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis.png" alt="" width="482" height="852" srcset="https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis-170x300.png 170w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis-200x354.png 200w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis-400x707.png 400w, https://cdn1.tarheel.media/wp-content/uploads/2024/03/ddos-attack-update-sloworis.png 482w" sizes="(max-width: 482px) 100vw, 482px" /></p>
<p><strong>3:35 pm:</strong> Issue closed. Attacks have ceased and we do not expect further impact to our services at this time.</p>
<p>We will continue to monitor traffic and remain in constant contact with upstream providers. If anything changes, we will post updates here.</p>
<p>The post <a href="https://tarheel.media/service-updates/2024/03/29/ddos-attack-on-web-ports/">DDOS Attack on Web Ports</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Net Neutrality: Navigating the Interplay Between Open Internet and Network Security</title>
		<link>https://tarheel.media/tips-tricks/2023/05/26/net-neutrality-navigating-the-interplay-between-open-internet-and-network-security/</link>
		
		<dc:creator><![CDATA[Mike W.]]></dc:creator>
		<pubDate>Fri, 26 May 2023 09:06:12 +0000</pubDate>
				<category><![CDATA[Laws & Regulations]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Tips & Tricks]]></category>
		<category><![CDATA[abuse complaints]]></category>
		<category><![CDATA[AI dependency]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Cyber threats]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[digital environment]]></category>
		<category><![CDATA[DNS amplification]]></category>
		<category><![CDATA[IP traffic]]></category>
		<category><![CDATA[net neutrality]]></category>
		<category><![CDATA[network integrity]]></category>
		<category><![CDATA[network management]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[open internet]]></category>
		<category><![CDATA[Tarheel Media]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=3515</guid>

					<description><![CDATA[<p>In the dynamic landscape of the digital world, the concept of net neutrality has sparked extensive debates. While net neutrality aims to ensure an open and equal internet experience for all users, it is essential to explore opposing viewpoints to gain a comprehensive understanding of its implications. In this blog post, we delve into the  [...]</p>
<p>The post <a href="https://tarheel.media/tips-tricks/2023/05/26/net-neutrality-navigating-the-interplay-between-open-internet-and-network-security/">Net Neutrality: Navigating the Interplay Between Open Internet and Network Security</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the dynamic landscape of the digital world, the concept of net neutrality has sparked extensive debates. While net neutrality aims to ensure an open and equal internet experience for all users, it is essential to explore opposing viewpoints to gain a comprehensive understanding of its implications. In this blog post, we delve into the complex interplay between net neutrality, network security, and the potential challenges it poses, such as DDoS attacks, DNS amplification, and the growing dependency on AI.</p>
<h2>The Role of Net Neutrality</h2>
<p>Net neutrality advocates for equal treatment of internet traffic, prohibiting Internet Service Providers (ISPs) from discriminating against specific types of data or giving preferential treatment to certain websites or services. It aims to maintain an open and level playing field, promoting innovation, competition, and free expression online. However, as with any policy, there are potential drawbacks that need to be examined.</p>
<h2>Network Security Concerns</h2>
<p>One of the concerns raised regarding net neutrality is its impact on network security, particularly in relation to Distributed Denial of Service (DDoS) attacks. DDoS attacks exploit the openness of the internet by overwhelming a target&#8217;s network with a massive volume of traffic, rendering their services inaccessible. Without the ability to discriminate or manage IP traffic based on network reputation, ISPs may face challenges in mitigating DDoS attacks effectively.</p>
<h2>Addressing Abuse Complaints</h2>
<p>Another aspect that can complicate the net neutrality discussion is the handling of abuse complaints. Net neutrality&#8217;s emphasis on equal treatment can limit an ISP&#8217;s ability to take immediate action against abusive behavior originating from a specific IP address or network. By restricting the ISP&#8217;s options, malicious actors can exploit the network&#8217;s neutrality, allowing the persistence of harmful activities and creating challenges for maintaining a secure digital environment.</p>
<h2>DNS Amplification Attacks</h2>
<p>Furthermore, net neutrality poses challenges when dealing with DNS amplification attacks. These attacks utilize the inherent openness of the Domain Name System (DNS) infrastructure to amplify the volume of traffic sent to a target network. As these attacks enter networks as seemingly legitimate traffic from spoofed IP addresses, the neutral stance of network management can make it more challenging to identify and block such malicious activities promptly.</p>
<h2>The Role of AI in Network Management</h2>
<p>As our digital ecosystem continues to evolve, artificial intelligence (AI) is playing an increasingly significant role in network management. With AI-driven technologies, ISPs can enhance their ability to monitor, detect, and respond to network security threats more efficiently. However, the neutral stance of net neutrality might impede the deployment of AI-based solutions, hindering the industry&#8217;s progress in combating emerging cyber threats effectively.</p>
<h2>Conclusion</h2>
<p>The concept of net neutrality is a complex and multifaceted one, with proponents highlighting its importance in fostering an open and equal internet experience. However, it is crucial to consider the potential challenges it poses, particularly in terms of network security, DDoS attacks, DNS amplification, and the increasing dependency on AI. Striking a balance between open internet principles and the need for robust network security measures is essential to ensure a safe and reliable digital environment for all users.</p>
<p>At Tarheel Media, we recognize the intricacies of net neutrality and the evolving landscape of network security. With our expertise in digital marketing, web design, and network management, we are committed to assisting businesses in navigating these complexities. Contact us today to discover how we can help you maintain a secure online presence while maximizing the potential of the open internet.</p>
<p>The post <a href="https://tarheel.media/tips-tricks/2023/05/26/net-neutrality-navigating-the-interplay-between-open-internet-and-network-security/">Net Neutrality: Navigating the Interplay Between Open Internet and Network Security</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
