Research: Tail Attacks on Web Applications
When you think of a Distributed Denial of Service (DDoS) attack, you probably think about an attack which overflows the bandwidth available on a single link; or overflowing the number of half open TCP sessions a device can have open at once, preventing the device from accepting more sessions. In all cases, a DoS or DDoS attack will involve a lot of traffic being pushed at a single device, or across a single link.
- Denial of service attacks do not always require high volumes of traffic
- An intelligent attacker can exploit the long tail of service queues deep in a web application to bring the service down
- These kinds of attacks would be very difficult to detect
But if you look at an entire system, there are a lot of places where resources are scarce, and hence are places where resources could be consumed in a way that prevents services from operating correctly. Such attacks would not need to be distributed, because they could take much less traffic than is traditionally required to deny a service. These kinds of attacks are called tail attacks, because they attack the long tail of resource pools, where these pools are much Continue reading
Sysdig CEO Suresh Vasudevan declined to comment on the company’s plans for an initial public offering.
T-Mobile is using Cisco’s virtualized packet core throughout its network today and will use it as it upgrades to a 5G packet core.

Meyers succeeds Peter Van Camp, who was named interim CEO in January when former CEO Steven Smith resigned suddenly after “exercising poor judgment with respect to an employee matter.”