

{"id":233,"date":"2016-04-20T19:52:21","date_gmt":"2016-04-20T19:52:21","guid":{"rendered":"http:\/\/warp.lacnic.net\/en\/?p=233"},"modified":"2016-06-29T15:24:21","modified_gmt":"2016-06-29T15:24:21","slug":"recomendaciones-para-ataques","status":"publish","type":"post","link":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques","title":{"rendered":"Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)"},"content":{"rendered":"<p>The document is in Portuguese, but CERT.br wanted to share anyway, as probably most of the Spanish speakers will be able to understand the concepts and tips.<\/p>\n<p>The document covers both handling a DDoS attack and preventing your network from being abused to perpetrate a DDoS attack against other organizations.<\/p>\n<p>The topics are broken down into these areas:<\/p>\n<p>&#8211; Main targets and motivations for DDoS attacks;<br \/>\n&#8211; How DDoS attacks are perpetrated;<br \/>\n&#8211; Types of DDoS attacks;<br \/>\n&#8211; How to stop your network from being abused to attack others (includes amplification, vulnerable Web applications and botnets);<br \/>\n&#8211; How to handle DDoS attacks, including preparation, detection, analysis, mitigation and post mortem.<\/p>\n<p>Hope this information can be useful to the community.<\/p>\n<p><a href=\"http:\/\/www.cert.br\/docs\/whitepapers\/ddos\/\" target=\"_blank\">Click here<\/a> to read the document.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The document is in Portuguese, but CERT.br wanted to share anyway, as probably most of the Spanish speakers will be able to understand the concepts and tips. The document covers both handling a DDoS attack and preventing your network from being abused to perpetrate a DDoS attack against other organizations. The topics are broken down [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-233","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC CSIRT - Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC CSIRT - Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)\" \/>\n<meta property=\"og:description\" content=\"The document is in Portuguese, but CERT.br wanted to share anyway, as probably most of the Spanish speakers will be able to understand the concepts and tips. The document covers both handling a DDoS attack and preventing your network from being abused to perpetrate a DDoS attack against other organizations. The topics are broken down [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC CSIRT\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-20T19:52:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-29T15:24:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni Arena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic_csirt\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic_csirt\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques\"},\"author\":{\"name\":\"Gianni Arena\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/person\\\/d5c65fde1dbe338128788dcc20e9f5d3\"},\"headline\":\"Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)\",\"datePublished\":\"2016-04-20T19:52:21+00:00\",\"dateModified\":\"2016-06-29T15:24:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques\"},\"wordCount\":137,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques\",\"name\":\"LACNIC CSIRT - Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\"},\"datePublished\":\"2016-04-20T19:52:21+00:00\",\"dateModified\":\"2016-06-29T15:24:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/uncategorized\\\/recomendaciones-para-ataques#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"name\":\"LACNIC CSIRT\",\"description\":\"Incident Response Center - LACNIC CSIRT\",\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\",\"name\":\"LACNIC CSIRT\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"contentUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"width\":680,\"height\":330,\"caption\":\"LACNIC CSIRT\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/lacnic_csirt\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/person\\\/d5c65fde1dbe338128788dcc20e9f5d3\",\"name\":\"Gianni Arena\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g\",\"caption\":\"Gianni Arena\"},\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/author\\\/gianni\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC CSIRT - Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques","og_locale":"en_US","og_type":"article","og_title":"LACNIC CSIRT - Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)","og_description":"The document is in Portuguese, but CERT.br wanted to share anyway, as probably most of the Spanish speakers will be able to understand the concepts and tips. The document covers both handling a DDoS attack and preventing your network from being abused to perpetrate a DDoS attack against other organizations. The topics are broken down [&hellip;]","og_url":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques","og_site_name":"LACNIC CSIRT","article_published_time":"2016-04-20T19:52:21+00:00","article_modified_time":"2016-06-29T15:24:21+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","type":"image\/png"}],"author":"Gianni Arena","twitter_card":"summary_large_image","twitter_creator":"@lacnic_csirt","twitter_site":"@lacnic_csirt","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques#article","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques"},"author":{"name":"Gianni Arena","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/person\/d5c65fde1dbe338128788dcc20e9f5d3"},"headline":"Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)","datePublished":"2016-04-20T19:52:21+00:00","dateModified":"2016-06-29T15:24:21+00:00","mainEntityOfPage":{"@id":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques"},"wordCount":137,"commentCount":0,"publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques#respond"]}]},{"@type":"WebPage","@id":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques","url":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques","name":"LACNIC CSIRT - Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/en\/#website"},"datePublished":"2016-04-20T19:52:21+00:00","dateModified":"2016-06-29T15:24:21+00:00","breadcrumb":{"@id":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csirt.lacnic.net\/en\/uncategorized\/recomendaciones-para-ataques#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/csirt.lacnic.net\/en"},{"@type":"ListItem","position":2,"name":"Recommendations for Improving the Distributed Denial of Service Attacks Scenario (DDoS)"}]},{"@type":"WebSite","@id":"https:\/\/csirt.lacnic.net\/en\/#website","url":"https:\/\/csirt.lacnic.net\/en\/","name":"LACNIC CSIRT","description":"Incident Response Center - LACNIC CSIRT","publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csirt.lacnic.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csirt.lacnic.net\/en\/#organization","name":"LACNIC CSIRT","url":"https:\/\/csirt.lacnic.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","contentUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","width":680,"height":330,"caption":"LACNIC CSIRT"},"image":{"@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/lacnic_csirt"]},{"@type":"Person","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/person\/d5c65fde1dbe338128788dcc20e9f5d3","name":"Gianni Arena","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc620878b92e4930abb5951af723f7e852088c31f8489beda9016e53725fb1f2?s=96&d=mm&r=g","caption":"Gianni Arena"},"url":"https:\/\/csirt.lacnic.net\/en\/author\/gianni"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":0,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/233\/revisions"}],"wp:attachment":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}