lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <001b01cc36be$336190e0$9a24b2a0$@co.kr> Date: Thu, 30 Jun 2011 09:39:41 +0900 From: 辫公己 <kimms@...osec.co.kr> To: "'coderman'" <coderman@...il.com> Cc: full-disclosure@...ts.grok.org.uk, pen-test@...urityfocus.com Subject: Re: how to detect DDoS attack through HTTP response analysis(throuput) You don't understand my question. I'm studying and researching about solution of DDoS detection through analysis of HTTP responses. For example, If only one response is detected several times, this is abnormal. -----Original Message----- From: coderman [mailto:coderman@...il.com] Sent: Wednesday, June 29, 2011 12:30 PM To: 辫公己 Cc: full-disclosure@...ts.grok.org.uk; pen-test@...urityfocus.com Subject: Re: [Full-disclosure] how to detect DDoS attack through HTTP response analysis(throuput) 2011/6/26 辫公己 <kimms@...osec.co.kr>: > ... > I'm looking for meterials or information, research about that how to detect > DDoS attack through HTTP response analysis(throuput). you're asking the wrong question. instead of asking "How can I automagically detect exploitation of my shitty app via HTTP Resp. codes" ask: "Why is my webapp so shitty that any number of arbitrary requests lead to resource exhaustion?" _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists