{"id":375,"date":"2019-01-25T21:30:51","date_gmt":"2019-01-25T20:30:51","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=375"},"modified":"2019-01-26T20:09:35","modified_gmt":"2019-01-26T19:09:35","slug":"les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/","title":{"rendered":"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES"},"content":{"rendered":"<p>Selon une analyse r\u00e9cente des donn\u00e9es relatives aux DDoS, le troisi\u00e8me trimestre de 2018 a vu une augmentation significative des attaques par d\u00e9ni de service visant les Fournisseurs d\u2019Acc\u00e8s \u00e0 Internet (FAI). L&rsquo;analyse a \u00e9t\u00e9 effectu\u00e9e par Nexusguard et le rapport est intitul\u00e9 <a href=\"https:\/\/www.marketwatch.com\/press-release\/nexusguard-report-shows-nearly-two-thirds-of-ddos-attacks-in-q3-2018-targeted-communications-service-providers-2019-01-21\">\u00ab\u00a0<u>Rapport de menace Q3 2018<\/u>\u00ab\u00a0<\/a><\/p>\n<p><strong>Nouvelle m\u00e9thode pour mener des attaques DDoS<\/strong><\/p>\n<p>Selon le rapport, les attaquants utilisent des m\u00e9thodes beaucoup plus furtives, ce qui revient \u00e0 cibler le trafic sur de nombreux pr\u00e9fixes IP. En g\u00e9n\u00e9ral, les <u><a href=\"https:\/\/koddos.net\/blog\/surge-of-ddos-attacks-hits-novembers-busiest-online-trading-days\/\">attaques DDoS<\/a><\/u> (ou attaque par d\u00e9ni de service) ont tendance \u00e0 cibler une seule adresse IP, ce qui peut \u00eatre \u00e9cras\u00e9e relativement facilement. Maintenant, cependant, les attaquants utilisent de petits bric-\u00e0-brac pour couvrir un grand nombre d&rsquo;adresses, souvent des centaines \u00e0 la fois.<\/p>\n<p>La m\u00e9thode s&rsquo;est av\u00e9r\u00e9e plut\u00f4t efficace pour ceux qui souhaitent submerger les r\u00e9seaux des fournisseurs de services de communications, car le trafic suppl\u00e9mentaire vient en plus petites doses, allant de 2,5 Mbps \u00e0 2,48 Gbps par IP. Cependant, la plupart d&rsquo;entre eux \u00e9taient entre 33,4Mbps et 300Mbps, ce qui les rend plus difficiles \u00e0 d\u00e9tecter. Cependant, bien qu&rsquo;ils soient petits, ils peuvent quand m\u00eame causer beaucoup de dommages \u00e0 un service ou \u00e0 un site Web cibl\u00e9.<\/p>\n<p>Selon le rapport, pr\u00e8s de 160 syst\u00e8mes autonomes appartenant \u00e0 des FAI ont \u00e9t\u00e9 attaqu\u00e9s en utilisant cette m\u00e9thode au T3 2018. De plus, les attaquants ont fait un effort pour cartographier pr\u00e9cis\u00e9ment le r\u00e9seau et d\u00e9terminer quelles adresses IP pourraient \u00eatre critiques. En raison de l&rsquo;\u00e9volution \u00e9vidente des m\u00e9thodes d&rsquo;attaque DDoS, les Fournisseur de Services Cloud devront trouver un moyen d&rsquo;am\u00e9liorer la s\u00e9curit\u00e9 de leur r\u00e9seau, ainsi que de s\u00e9curiser davantage leur infrastructure. Il en va de m\u00eame pour les entreprises qui pourraient \u00eatre cibl\u00e9es par la m\u00eame m\u00e9thode \u00e0 l&rsquo;avenir.<\/p>\n<p>Le rapport mentionne \u00e9galement que les FSC ont \u00e9t\u00e9 la cible de plus de 65 % des attaques qui ont eu lieu dans le monde au troisi\u00e8me trimestre. L&rsquo;une des m\u00e9thodes propos\u00e9es pour traiter la <u><a href=\"https:\/\/koddos.net\/blog\/new-ddos-attack-hits-abn-amro-and-rabobank\/\">nouvelle m\u00e9thode d&rsquo;attaque DDoS<\/a><\/u> serait que les organisations utilisent le cloud en p\u00e9riph\u00e9rie du r\u00e9seau, ce qui partagerait la charge et r\u00e9duirait l&rsquo;impact des attaques en cours.<\/p>\n<p>Les <u><a href=\"https:\/\/fr.koddos.net\/protection-ddos.html\">mesures traditionnelles contre les attaques DDoS,<\/a><\/u> telles que l&rsquo;utilisation de trou noir, ne vont tout simplement pas fonctionner dans ce sc\u00e9nario, car de nombreuses adresses IP sont affect\u00e9es en m\u00eame temps.<\/p>\n<p>Les chercheurs ont d\u00e9couvert que, malgr\u00e9 la r\u00e9duction de la taille des attaques par IP, la nouvelle m\u00e9thode a le potentiel de rendre les attaques DDoS beaucoup plus importantes. Au fil des ans, les chercheurs ont signal\u00e9 que les attaques DDoS deviennent de plus en plus massives et sophistiqu\u00e9es, et le nouveau rapport indique que cette tendance se maintient.<\/p>\n<p>En outre, la popularit\u00e9 des attaques s&rsquo;est \u00e9galement accrue, et de nombreux rapports font \u00e9tat de sites Web qui offrent des attaques DDoS \u00e0 ceux qui sont pr\u00eats \u00e0 les payer. Ces services ont \u00e9galement \u00e9t\u00e9 cibl\u00e9s par les autorit\u00e9s, qui ont pris plusieurs mesures pour les fermer auparavant. Malgr\u00e9 le succ\u00e8s de ces op\u00e9rations, de nombreux sites Web de location de DDoS subsistent encore, tandis que de nouveaux services voient le jour.<\/p>\n<p>Selon le r\u00e9cent <u><a href=\"https:\/\/www.netscout.com\/blog\/netscout-predicts-security-trends-2019\">blog<\/a><\/u> de NETSCOUT, on pr\u00e9voit qu&rsquo;encore plus d&rsquo;attaquants appara\u00eetront en 2019, et continueront \u00e0 offrir leurs services. Les chercheurs ont \u00e9galement not\u00e9 que bon nombre des outils offerts par les sites Web de location de DDoS ne sont pas nouveaux, mais qu&rsquo;ils fonctionnent toujours. Leur acc\u00e8s facile augmente le danger pour les sites Web l\u00e9gitimes, tandis que les menaces comme les logiciels malveillants continuent d&rsquo;\u00e9voluer et causent des dommages de plus en plus importants.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selon une analyse r\u00e9cente des donn\u00e9es relatives aux DDoS, le troisi\u00e8me trimestre de 2018 a vu une augmentation significative des attaques par d\u00e9ni de service visant les Fournisseurs d\u2019Acc\u00e8s \u00e0 Internet (FAI). L&rsquo;analyse a \u00e9t\u00e9 effectu\u00e9e par Nexusguard et le rapport est intitul\u00e9 \u00ab\u00a0Rapport de menace Q3 2018\u00ab\u00a0 Nouvelle m\u00e9thode pour mener des attaques DDoS &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":376,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Selon une analyse r\u00e9cente des donn\u00e9es relatives aux DDoS, le troisi\u00e8me trimestre de 2018 a vu une augmentation significative des attaques par d\u00e9ni de service visant les Fournisseurs d\u2019Acc\u00e8s \u00e0 Internet (FAI). L&rsquo;analyse a \u00e9t\u00e9 effectu\u00e9e par Nexusguard et le rapport est intitul\u00e9 \u00ab\u00a0Rapport de menace Q3 2018\u00ab\u00a0 Nouvelle m\u00e9thode pour mener des attaques DDoS &hellip; Continue reading LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-25T20:30:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-26T19:09:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/01\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES\",\"datePublished\":\"2019-01-25T20:30:51+00:00\",\"dateModified\":\"2019-01-26T19:09:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/\"},\"wordCount\":668,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/\",\"name\":\"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1\",\"datePublished\":\"2019-01-25T20:30:51+00:00\",\"dateModified\":\"2019-01-26T19:09:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1\",\"width\":880,\"height\":543},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/","og_locale":"fr_FR","og_type":"article","og_title":"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES - Blog KoDDoS","og_description":"Selon une analyse r\u00e9cente des donn\u00e9es relatives aux DDoS, le troisi\u00e8me trimestre de 2018 a vu une augmentation significative des attaques par d\u00e9ni de service visant les Fournisseurs d\u2019Acc\u00e8s \u00e0 Internet (FAI). L&rsquo;analyse a \u00e9t\u00e9 effectu\u00e9e par Nexusguard et le rapport est intitul\u00e9 \u00ab\u00a0Rapport de menace Q3 2018\u00ab\u00a0 Nouvelle m\u00e9thode pour mener des attaques DDoS &hellip; Continue reading LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES","og_url":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-01-25T20:30:51+00:00","article_modified_time":"2019-01-26T19:09:35+00:00","og_image":[{"width":880,"height":543,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/01\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES","datePublished":"2019-01-25T20:30:51+00:00","dateModified":"2019-01-26T19:09:35+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/"},"wordCount":668,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/01\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/","url":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/","name":"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/01\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1","datePublished":"2019-01-25T20:30:51+00:00","dateModified":"2019-01-26T19:09:35+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/01\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/01\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1","width":880,"height":543},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-attaques-ddos-ciblant-les-fai-utilisent-de-nouvelles-methodes-furtives\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES ATTAQUES DDOS CIBLANT LES FAI UTILISENT DE NOUVELLES METHODES FURTIVES"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/01\/Memcached-DDoS-Attacks-Exposed-through-PoC-codes-and-IP-address.jpg?fit=880%2C543&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-63","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":6,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/375\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/375\/revisions\/386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/376"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}