How Worried Should You Be About Dynamic IPs?

One of the oldest, most tried-and-true methods of defeating a DDoS attack is by blocking the IP addresses used to execute it. Unfortunately, criminals are acutely aware of that fact – and in response, they’ve begun launching their attacks through a completely different vector: Layer 7, the application layer. By using real IP addresses, they’re able to establish a three-way TCP handshake, bypassing both cookies and JavaScript. Worse still, many of these attacks have grown surprisingly complex, implementing human like browsing behaviors, patterns, and timing. This means that the larger the attacks are, the more difficult they are to detect.  And IP-based defense systems cannot effectively tell the difference between these attacks and legitimate visitors – meaning that if they’re […]

Continue reading