Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS


Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Threats

DoS: Application Layer

Posted on 05/21/2015, by David Cantón (INCIBE)
Application layer denial of service attacks are the second main group of Denial of Service (DoS) attacks, along with DoS attacks against the infrastructure layer. As its name indicates, these types of attacks are targeted at the application layer or layer seven of the OSI model. Their objective is to cause a denial of service, taking advantage of design flaws in the communications protocol...
DoS Attacks

DoS Attacks: Infrastructure Layer

Posted on 04/09/2015, by David Cantón (INCIBE)
As we have already mentioned previously, infrastructure attacks are those that focus mainly on layers three and four of the OSI model (ISO/IEC 7498-1) and application layer protocols that support communications, such as DNS or NTP. This is the most frequent type of attack and, as illustrated in the following graphic, makes up 90% of the DDoS attacks detected by Akamai in the fourth quarter of...
Classification of DoS Attacks

Classification of DoS Attacks

Posted on 02/26/2015, by David Cantón (INCIBE)
Denial-of-Service (DoS) attacks are one of the most frequent types of security incident and continue to be used extensively. In many cases, carrying out a denial-of-service attack does not require advanced knowledge. Some examples of this sort of aggression would be the attack suffered by 19,000 French web-sites in the context of the deadly assault on the premises of the satirical magazine...
Botnet SPAM

Botnet detection: SPAM analysis

Posted on 02/10/2015, by David Cantón (INCIBE)
Sending spam is a classic operation performed by botnets, which is why it is logical to use SPAM analysis methods in botnet detection techniques. Instead of observing and analyzing all of the network traffic.