{"version":"1.0","provider_name":"LACNIC Blog","provider_url":"https:\/\/blog.lacnic.net\/pt-br\/","title":"LACNIC Blog | Mitiga\u00e7\u00e3o de ataques com novas tecnologias","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"HqE3kyDzhZ\"><a href=\"https:\/\/blog.lacnic.net\/pt-br\/mitigacao-de-ataques-com-novas-tecnologias\/\">Mitiga\u00e7\u00e3o de ataques com novas tecnologias<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.lacnic.net\/pt-br\/mitigacao-de-ataques-com-novas-tecnologias\/embed\/#?secret=HqE3kyDzhZ\" width=\"600\" height=\"338\" title=\"&#8220;Mitiga\u00e7\u00e3o de ataques com novas tecnologias&#8221; &#8212; LACNIC Blog\" data-secret=\"HqE3kyDzhZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.lacnic.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/07\/thumb-frida-latencia-jul-22.png","thumbnail_width":680,"thumbnail_height":330,"description":"El Tecnol\u00f3gico de Monterrey ha desarrollado un proyecto para la mitigaci\u00f3n de ataques de denegaci\u00f3n de servicio distribuidos (DDoS) usando tecnolog\u00edas emergentes e inteligencia artificial. Frente al notorio incremento de los ataques de DDoS, un grupo de investigadores de Monterrey decidi\u00f3 llevar adelante esta investigaci\u00f3n, sobre todo en redes definidas por software (SDN). El trabajo [&hellip;]"}