{"id":23375,"date":"2023-10-19T14:30:38","date_gmt":"2023-10-19T14:30:38","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=23375"},"modified":"2023-10-19T14:37:22","modified_gmt":"2023-10-19T14:37:22","slug":"identifying-ddos-attack-traffic-on-a-corporate-network","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/","title":{"rendered":"Identifying DDoS Attack Traffic on a Corporate Network"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/lizzette-perez\">Lizzette P\u00e9rez<\/a>, Computer Weekly Executive Editor for Latin America<\/p>\n\n\n\n<p><em>Originally published in <\/em><a href=\"https:\/\/www.computerweekly.com\/es\/consejo\/Como-identificar-trafico-de-ataques-DDoS-en-la-red-empresarial\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Computer Weekly<\/em><\/a><em> on 3 October 2023<\/em><\/p>\n\n\n\n<p><a><\/a><strong>During the first day of LACNOG 2023, an expert explained how traffic from denial-of-service attacks can be detected and shared some tools that can help with this task.<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>Fortaleza, Brazil. \u2013 <\/strong><a href=\"https:\/\/lacnic40.lacnic.net\/en\" target=\"_blank\" rel=\"noreferrer noopener\">LACNIC 40<\/a> is being held this week in Northern Brazil. Within the framework of this event, the Latin American and Caribbean Network Operators Group (<a href=\"https:\/\/lacnog.org\/seccion\/home\" target=\"_blank\" rel=\"noreferrer noopener\">LACNOG<\/a>) has scheduled various working sessions.<\/p>\n\n\n\n<p>Highlights of LACNOG 2023 include the conference by Rich Compton, member of the Latin American and Caribbean Anti-Abuse Working Group&nbsp; (LAC-AAWG), who gave a remote presentation on how to identify spoofed <a href=\"https:\/\/www.computerweekly.com\/es\/definicion\/Ataque-de-denegacion-de-servicio-DDoS\" target=\"_blank\" rel=\"noreferrer noopener\">Denial-of-Service (DDoS) amplification attack<\/a>s in a network.<\/p>\n\n\n\n<p>Rich Compton is an expert on <a href=\"https:\/\/www.computerweekly.com\/es\/respuesta\/Tres-enfoques-sobre-como-prevenir-ataques-DDoS-en-redes\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS attack detection and mitigation<\/a>, botnet control, and BGP security who works at Charter Communications, where he is responsible for network infrastructure security.<\/p>\n\n\n\n<p>In his presentation, Compton explained that the most common UDP DDoS amplifications include DDoS attacks on DNS, NTP, WS-Discovery, LDAP, Apple Remote Desktop, Multicast DNS (mDNS), and Plex. Amplifications have also been observed using only SYN\/ACK, PSH, and RST.<\/p>\n\n\n\n<p>According to the expert, TCP Middlebox Amplification is a new type of attack that began to be noticed recently. In his opinion this type of threat should actually be called \u201cHTTP Middlebox Amplification,\u201d as it attacks the middleboxes on the network by sending large amounts of HTTP traffic so that some packets will be lost, and then injecting traffic to block the connections. In this case, pornographic content is typically used, he explained.<\/p>\n\n\n\n<p>Why is this such a problem? According to the speaker, when customers with open amplifier have slow internet speed, they usually contact customer service. However, if no unusual activity is detected, the suggestion will be to purchase more bandwidth, which does not solve the problem and can sometimes affect other customers.<\/p>\n\n\n\n<p>\u201cNew vulnerable devices are added to the network every day. We can&#8217;t get everyone to fix their devices. And even if 99% of devices are fixed, the remaining 1% will still be a problem,\u201d Compton said.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>How can we identify these attacks?<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>Compton explained that the easiest way to identify this malicious activity is to check if Source port is 80 or 443 and Destination port is an open amplifier below 1023. \u201cNo false positives,\u201d he stressed.<\/p>\n\n\n\n<p>Compton then mentioned some useful tools that can help with this task. For example, <a href=\"https:\/\/www.shadowserver.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shadowserver<\/a>, a nonprofit security organization, provides a free daily report of open amplifiers on your network via API, and now also provides the amplification factor so that users can prioritize.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cablelabs.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CableLabs<\/a> has a project that provides <a href=\"https:\/\/www.m3aawg.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">a list of source IPs<\/a> in your network that are the source of DDoS traffic. This list can be queried free of charge.<\/p>\n\n\n\n<p>The presenter also shared information on <a href=\"https:\/\/github.com\/racompton\/tattle-tale\" target=\"_blank\" rel=\"noreferrer noopener\">Tattle Tale<\/a>, a project he is leading on Github.<\/p>\n\n\n\n<p>To conclude, he demonstrated how to use the tools above and included suggestions such as Source Address Validation and the <a href=\"https:\/\/www.caida.org\/projects\/spoofer\/\" target=\"_blank\" rel=\"noreferrer noopener\">CAIDA Spoofer Project<\/a>, a service that generates spoofed packets and provides reports.<\/p>\n\n\n\n<p>However, he added, not everything is bad news, as, according to Netscout, traffic from DDoS amplification attacks is declining.<\/p>\n\n\n\n<p>So, what are the next steps? Compton recommends that more ISPs and Internet Exchange Providers (IXPs) look for spoofed amplification traffic, so that they can block DDoS traffic and thus minimize the impact on end users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Lizzette P\u00e9rez, Computer Weekly Executive Editor for Latin America Originally published in Computer Weekly on 3 October 2023 During the first day of LACNOG 2023, an expert explained how traffic from denial-of-service attacks can be detected and shared some tools that can help with this task. Fortaleza, Brazil. \u2013 LACNIC 40 is being held [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":23371,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499,501],"tags":[1271,1283],"archivo":[1345],"taxonomy-authors":[1428],"tipo_autor":[],"class_list":["post-23375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-events","tag-cibersecurity","tag-events","archivo-editions","taxonomy-authors-lizzette-perez-en"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Identifying DDoS Attack Traffic on a Corporate Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Identifying DDoS Attack Traffic on a Corporate Network\" \/>\n<meta property=\"og:description\" content=\"By Lizzette P\u00e9rez, Computer Weekly Executive Editor for Latin America Originally published in Computer Weekly on 3 October 2023 During the first day of LACNOG 2023, an expert explained how traffic from denial-of-service attacks can be detected and shared some tools that can help with this task. Fortaleza, Brazil. \u2013 LACNIC 40 is being held [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T14:30:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T14:37:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Identifying DDoS Attack Traffic on a Corporate Network\",\"datePublished\":\"2023-10-19T14:30:38+00:00\",\"dateModified\":\"2023-10-19T14:37:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/\"},\"wordCount\":562,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png\",\"keywords\":[\"Cibersecurity\",\"Events\"],\"articleSection\":[\"Cybersecurity\",\"Events\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/\",\"name\":\"LACNIC Blog | Identifying DDoS Attack Traffic on a Corporate Network\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png\",\"datePublished\":\"2023-10-19T14:30:38+00:00\",\"dateModified\":\"2023-10-19T14:37:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identifying DDoS Attack Traffic on a Corporate Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Identifying DDoS Attack Traffic on a Corporate Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Identifying DDoS Attack Traffic on a Corporate Network","og_description":"By Lizzette P\u00e9rez, Computer Weekly Executive Editor for Latin America Originally published in Computer Weekly on 3 October 2023 During the first day of LACNOG 2023, an expert explained how traffic from denial-of-service attacks can be detected and shared some tools that can help with this task. Fortaleza, Brazil. \u2013 LACNIC 40 is being held [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2023-10-19T14:30:38+00:00","article_modified_time":"2023-10-19T14:37:22+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Identifying DDoS Attack Traffic on a Corporate Network","datePublished":"2023-10-19T14:30:38+00:00","dateModified":"2023-10-19T14:37:22+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/"},"wordCount":562,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png","keywords":["Cibersecurity","Events"],"articleSection":["Cybersecurity","Events"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/","url":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/","name":"LACNIC Blog | Identifying DDoS Attack Traffic on a Corporate Network","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png","datePublished":"2023-10-19T14:30:38+00:00","dateModified":"2023-10-19T14:37:22+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/identifying-ddos-attack-traffic-on-a-corporate-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Identifying DDoS Attack Traffic on a Corporate Network"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/10\/ddos-atack-2023.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":23369,"post_title":"\u00bfC\u00f3mo identificar tr\u00e1fico de ataques DDoS en la red empresarial?","slug":"como-identificar-trafico-de-ataques-ddos-en-la-red-empresarial","href":"https:\/\/blog.lacnic.net\/como-identificar-trafico-de-ataques-ddos-en-la-red-empresarial\/"},{"locale":"pt_BR","id":23378,"post_title":"Como identificar o tr\u00e1fego de ataque DDoS na rede corporativa?","slug":"como-identificar-o-trafego-de-ataque-ddos-na-rede-corporativa","href":"https:\/\/blog.lacnic.net\/pt-br\/como-identificar-o-trafego-de-ataque-ddos-na-rede-corporativa\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/23375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=23375"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/23375\/revisions"}],"predecessor-version":[{"id":23381,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/23375\/revisions\/23381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/23371"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=23375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=23375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=23375"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=23375"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=23375"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=23375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}