Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Overview of GitHub DDoS Attack

Github active malware consists of a community that includes the major advantages of members and community. On 28th February 2018, Github was mainly the large victim of the large DDoS attack in the human industry. The attackers took advantage of a caching system which is known as Memcached. In  DDoS attacks, the attackers use the “growth factor” concept in Memcached (Wi, Choi and Cha 2018). The GitHub attacks were mainly the Memcached DDoS attacks and there were no botnets involved in the attackers and highly leveraged the overall amplification effects of cracking the database systems. The largest verifiable DDoS attacks in records targeted Githubs, the popular online code management service. This report will describe the cause of DDoS attacks in detail. Github survived the DDoS attacks that are recorded. Github survived the biggest ever DDOS attacks that are recorded.

The largest-ever DDoS attack that was recorded on the targeted Github is mainly a popular online code management service that is mainly used by millions of developers. The attacks reached almost 1.3 Tbps and sent packets at 126.9 million per second (Wang,et al. 2018). The Github attack was the Memcached DDoS attack, and there was no involvement of botnets. The attackers approximately leveraged the amplification effects, and the effects of the database systems process are known as Memcached. The Memcached servers with mainly the spoofed request and the attackers are mainly able to amplify the attacks by almost 50,000 times. GitHub was using the DDoS protection services and was almost altered within 10 minutes since the attacks started. The entire alert almost triggered the entire process of mitigation, and GitHub was able to stop the entire attack quickly.

The Memcached distributed denial of service is mainly a specific type of cyber attack where the attackers highly attempt to overload a targeted victim with the help of internet traffic. The attackers spoof the main requests; the UDP  Memcached servers mainly target the victims with internet traffic and potentially target the resources of victims. The internet infrastructure is overloaded, and the new requests are processed accordingly. The regular traffic is unable to check the internet resources and thus results mainly in denial of service. GitHub is mainly an important resource for most mainly around the world, and fell victims to the colossal DDoS attacks. Despite the attacks, Github had taken strict measures in ensuring DDoS to jump to mainly the hoops and in taking the site offline. The ten minutes of intermittent downtime prior to anti-DDoS technologies played the role of cavalry, and the attack started to drain away to mainly nothing in terms of comparison. The technical name is given as “UDP - based reflection attack vector”. The attack largely helps in attacking the severe, mainly under a thousand miles of data-driven concrete. The attack was done by the concept of Memcached, which is exposed over the internet. The main way of running Memcached is to shore things, and the attack almost struggles to almost clocking at 51,000 times of the original strength. DDoS attacks have been around for a long time, and a 600MB+/ second attack was mainly the biggest strength that occurred for a long period of time. The concern is quite never-ending, and it keeps the possibility of attacks down to a minimum level. The most recent attack was mainly political in nature under suspicion. The duplicate files need’ to be avoided and must be out of Botnet attacks. The services need to be hidden from the web and will prevent a lot of bad people from using nefarious purposes. The change in Multinational corporations of websites and services from homes and there are no types of obstacles to avoiding a fresh wave of DDoS   

The Memcached DDoS Attack

In my opinion, DDoS attacks are the most vulnerable type of attack that is mainly exposed to servers like Github. In my opinion, DDoS attacks are massive attacks that occur on websites. As per my knowledge, Memcached amplification is thought of in the context of malicious attacks and occurs in four steps. The first step, according to my knowledge, is the attacker uses the concepts of payload data mainly on various Memcached servers. The attackers try to spoof mainly in HTTP GETs with the IP address of the targeted victims. I have seen that Memcached servers help in receiving the request and try to be helpful by sending a huge response to the target (Shaham et al. 2018). The targeted server across the surrounding infrastructure mainly tries to process a hygge amount of data from the Memcached servers, and is eventually results in denial of service to legitimate requests (Zhao et al.. 2018). As per my knowledge, there are several ways of Memcached servers where mitigation is done. These are disabling UDP, Memcached servers, IP spoofing and developing software with most of the UDP responses. The Cloudflare filters UDP traffic mainly at the network edge and helps in eliminating the request that is posed by the amplification attacks.

Github is an important resource for most organizations, and it is unavailable mainly from 17:21 to 17:26. It resulted in increased inbound traffic, which reached almost  1.35Tbps per second, and it outflanked almost 1Tbps provider in September 2016. The attack occurred due to the obstruction of unwanted traffic and is unleashed by IoT (Sun et al. 2018). The attack mainly across Github did not exploit any types of compromised devices. The servers speed up web applications and are used for amplification of traffic at the targeted device.

Incident time 

Figure 1: Incident time

(Source: Kottler 2018)

The threats at Github involve spoofing of IP addresses and sending repeated numbers of smaller queries to a number of Memcached servers. The main cause of Github attacks is the DDoS attacks which occurred due to Memcached servers. The spoofing of IP addresses enables in allowing the responses of Memcached responses, which will be targeted against all types of website that serves GitHub.com (Mosayyebzadeh et al. 2018). It helps send more data toward the target and needs to be sent by the un spoofed sources. After the inception of DDoS attacks, Github enlisted the aid of DDoS mitigation services. The junk of the traffic is rerouted through the network and in blocking all types of malicious attacks. The threat is then dropped from the attack.

 First portion of the attack

Figure 2: First portion of the attack

(Source: Kottler, 2018)

The attacker can easily access all types of command packets, and the server will respond. Most of the record attacks will not last long due to spoofing of IP addresses. DDoS attacks are mainly the weapon of choice and in targeting online. The infamous DDoS attacks consist of a series of onslaughts against all types of DNS hosting providers (Chen et al. 2018). For almost a year, more additional transits have been added to the facilities, and it has allowed them to withstand huge attacks and has fewer complications, mainly for users (Zugner,  Akbarnejad and Gunnemann 2018). The attacks require the overall help of partners with the help of large transit networks and help in providing all types of process like filtering and blocking. The main vulnerability that occurs due to the amplification factor has the ability in ramping up of amplification factor by a few approaches. It is described that almost all the peaks are mainly at  1.35 Tbps, and it is almost a 126.9million packets per second. The network system is detected to evaluate the peaks and the ratio of ingress traffic that is to be notified.

GitHub's Survival and Mitigation of the Attack

Analysis of attack 

Figure 3: Analysis of attack

(Source:Kottler, 2018)

The routes are mainly converged, and it is to be monitored by accessing the control levels, which is of utmost importance. The exchange was withdrawn and showed the overall recovery at almost 17:30 UTC. At 17:34 UTC, the route of internet exchanges was mainly withdrawn as follow up to move almost additional 40Gbps away from the main edge. The first portion of the attack peaked at almost 1.35Tbos, and an approximately 400GBps spike is thereafter almost 18:00 UTC (S 2018).The lists of Memcached attacks that are to be mitigated are the disable UDP which disables UDP support. The Memcached has mainly UDP support and leaves the servers more vulnerable (Wang, Santillan and Kuipers 2018.) The firewall Memcached servers from the internet systems are able to control the systems of UDP without any types of exposure. The IP spoofing is mainly the IP addresses that are to be spoofed easily. The spoofing process is the optimum system that requires all types of transit providers and does not allow the packets to leave the network. The IP address originates mainly outside of the network. Companies use transit providers to be implemented in spoofing attacks that occur overnight. The other main way in developing software with UDP responses is to reduce the amplification attacks in all types of incoming requests (Zheng and Yang 2018). The maximum UDP traffic uses the concept of network edge and helps in eliminating the request posed by the attacks, which are the DDoS attacks. The main reasons for attacks are mainly the hackers, and from that point in time, the attacks are mainly severe. The responses from Github show the defences are usually robustness. The DDoS attacks pummeled Github for almost 15-20 minutes (Li et al. 2020). The edge infrastructure was quite more resilient to both past and present conditions of the internet and is almost less dependent on the infrastructures.  

Conclusion 

It is to be concluded that  DDOS attacks need to be reduced to a large extent by implementing bots. GitHub recently revealed that this had been subjected to what must be the world's biggest distributed denial of service (DDoS) attack. The major effort on the engineering stage peaked at 1.35 terabits per second, with a second 400 terabits per second increase thereafter. This would make it the most powerful DDoS attack ever recorded. The greatest has recently begun at roughly 1.1Tbps. According to a post on the designer stage's web diary, GitHub.com was offline from 17:21 to 17:26 UTC on discontinuously inaccessible from 17:26 to 17:30 UTC due to a DDoS attack.

References

Chen, S.T., Cornelius, C., Martin, J. and Chau, D.H.P., 2018, September. Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases (pp. 52-68). Springer, Cham.Demoulin, H.M., Vaidya, T., Pedisich, I., DiMaiolo, B., Qian, J., Shah, C., Zhang, Y., Chen, A., Haeberlen, A., Loo, B.T. and Phan, L.T.X., 2018, December. Dedos: Defusing dos with dispersion oriented software. In Proceedings of the 34th Annual Computer Security Applications Conference (pp. 712-722).

Li, H., Patnaik, S., Ashraf, M., Yang, H., Knechtel, J., Yu, B., Sinanoglu, O. and Young, E.F., 2020. Deep learning analysis for split-manufactured layouts with routing perturbation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 40(10), pp.1995-2008.

Mosayyebzadeh, A., Ravago, G., Mohan, A., Raza, A., Tikale, S., Schear, N., Hudson, T., Hennessey, J., Ansari, N., Hogan, K. and Munson, C., 2018. A secure cloud with minimal provider trust. In 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18).

S. Kottler, “February 28th ddos incident report,” The GitHub Blog, 01-Mar-2018. [Online]. Available: https://github.blog/2018-03-01-ddos-incident-report/. [Accessed: 30-Mar-2022].

Shaham, U., Garritano, J., Yamada, Y., Weinberger, E., Cloninger, A., Cheng, X., Stanton, K. and Kluger, Y., 2018. Defending against adversarial images using basis functions transformations. arXiv preprint arXiv:1803.10840.

Sun, L., Dou, Y., Yang, C., Wang, J., Yu, P.S., He, L. and Li, B., 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528.

Wang, D., Ming, J., Chen, T., Zhang, X. and Wang, C., 2018, May. Cracking IoT device user account via brute-force attack to SMS authentication code. In Proceedings of the First Workshop on Radical and Experiential Security (pp. 57-60).

Wang, M., Santillan, J. and Kuipers, F., 2018. Thingpot: an interactive internet-of-things honeypot. arXiv preprint arXiv:1807.04114.

Wi, S., Choi, J. and Cha, S.K., 2018. Git-based {CTF}: A Simple and Effective Approach to Organizing {In-Course}{Attack-and-Defense} Security Competition. In 2018 USENIX Workshop on Advances in Security Education (ASE 18).

Zhao, P., Liu, S., Wang, Y. and Lin, X., 2018, October. An admm-based universal framework for adversarial attacks on deep neural networks. In Proceedings of the 26th ACM international conference on Multimedia (pp. 1065-1073).

Zheng, S. and Yang, X., 2018, August. DynaShield: A cost-effective DDoS defense architecture. In Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos (pp. 15-17).

Zugner, D., Akbarnejad, A. and Gunnemann, S., 2018. Adversarial attacks on neural networks for graph data. In KDD (pp. 2847-2856).

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). GitHub DDoS Attack: Cause And Mitigation Essay.. Retrieved from https://myassignmenthelp.com/free-samples/cmp6176-ethical-hacking/github-attack-file-A1E1944.html.

"GitHub DDoS Attack: Cause And Mitigation Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/cmp6176-ethical-hacking/github-attack-file-A1E1944.html.

My Assignment Help (2022) GitHub DDoS Attack: Cause And Mitigation Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/cmp6176-ethical-hacking/github-attack-file-A1E1944.html
[Accessed 08 May 2024].

My Assignment Help. 'GitHub DDoS Attack: Cause And Mitigation Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/cmp6176-ethical-hacking/github-attack-file-A1E1944.html> accessed 08 May 2024.

My Assignment Help. GitHub DDoS Attack: Cause And Mitigation Essay. [Internet]. My Assignment Help. 2022 [cited 08 May 2024]. Available from: https://myassignmenthelp.com/free-samples/cmp6176-ethical-hacking/github-attack-file-A1E1944.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close