{"id":8110,"date":"2022-05-25T11:43:03","date_gmt":"2022-05-25T08:43:03","guid":{"rendered":"https:\/\/www.inforte.com\/?p=8110"},"modified":"2022-05-25T11:43:03","modified_gmt":"2022-05-25T08:43:03","slug":"rusya-ddos-tehdit-genel-gorunumu","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/rusya-ddos-tehdit-genel-gorunumu\/","title":{"rendered":"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc"},"content":{"rendered":"<p><strong>Y\u00f6netici \u00d6zeti<\/strong><\/p>\n<p>NETSCOUT Arbor Siber G\u00fcvenlik M\u00fchendisli\u011fi ve M\u00fcdahale Ekibi (ASERT), 2022 \u015eubat ay\u0131n\u0131n ortas\u0131ndan bu yana Rusya ve Ukrayna&#8217;daki durumu izliyor. K\u0131sa s\u00fcre \u00f6nce, Ukrayna&#8217;daki kurulu\u015flar\u0131, a\u011flar\u0131, uygulamalar\u0131 ve hizmetleri hedef alan devam eden y\u00fcksek profilli DDoS sald\u0131r\u0131lar\u0131n\u0131n ilk teknik analizine y\u00f6nelik bir g\u00fcncelleme yay\u0131nlad\u0131k.<\/p>\n<p>Rus hedeflerine odaklanan DDoS sald\u0131r\u0131lar\u0131nda ikinci bir belirgin art\u0131\u015f da ortaya \u00e7\u0131kt\u0131 ve bu da Rusya&#8217;ya y\u00f6nelik sald\u0131r\u0131larda aydan aya ~%236 art\u0131\u015fa neden oldu. Bu \u00e7at\u0131\u015fmaya do\u011frudan dahil olmayan kom\u015fu \u00fclkelere y\u00f6nelik DDoS sald\u0131r\u0131lar\u0131n\u0131n ayn\u0131 aral\u0131kta t\u00fcm Avrupa, Orta Do\u011fu ve Afrika (EMEA) b\u00f6lgesinde ~%32 d\u00fc\u015ft\u00fc\u011f\u00fc g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, Rus \u00e7evrimi\u00e7i m\u00fclklerine y\u00f6nelik sald\u0131r\u0131lardaki art\u0131\u015f \u00f6zellikle dikkate de\u011ferdir.<\/p>\n<p>DDoS vekt\u00f6r se\u00e7imi ve hedefleme kriterleri a\u00e7\u0131s\u0131ndan hem Rusya&#8217;ya hem de Ukrayna&#8217;ya y\u00f6nelik sald\u0131r\u0131larda bir\u00e7ok benzerlik bulunurken, sald\u0131r\u0131 hacimleri olduk\u00e7a farkl\u0131la\u015ft\u0131. Bug\u00fcne kadar, Rus m\u00fclklerine kar\u015f\u0131 g\u00f6zlemledi\u011fimiz en y\u00fcksek bant geni\u015fli\u011fi (bps) sald\u0131r\u0131s\u0131 ~ 454 Gbps&#8217;de \u00f6l\u00e7\u00fcld\u00fc. Ayn\u0131 d\u00f6nemde en y\u00fcksek verim (pps) sald\u0131r\u0131s\u0131 ~173 mpps&#8217;de \u00f6l\u00e7\u00fclm\u00fc\u015ft\u00fcr. Bu \u00f6l\u00e7\u00fcmler, k\u00fcresel olarak g\u00f6zlemlenen en b\u00fcy\u00fck DDoS sald\u0131r\u0131lar\u0131na yakla\u015fmasa da, bu \u00f6l\u00e7ekteki sald\u0131r\u0131lar, yaln\u0131zca ama\u00e7lanan hedefler i\u00e7in internet operasyonlar\u0131n\u0131 ciddi \u015fekild y\u0131k\u0131c\u0131 potansiyele sahip olmakla kalmaz, ayn\u0131 zamanda ba\u011fl\u0131 kurulu\u015flar ve internet trafi\u011fi i\u00e7in \u00f6nemli bir\u00a0 side effect ayak izi de olabilir.<\/p>\n<p>Sald\u0131r\u0131lar\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011funun, \u00f6ny\u00fckleme\/stresleme hizmetleri olarak da bilinen, halka a\u00e7\u0131k kiral\u0131k DDoS hizmetlerinden kaynakland\u0131\u011f\u0131 g\u00f6r\u00fcl\u00fcyor. Bu yasa d\u0131\u015f\u0131 hizmetlerin neredeyse tamam\u0131, potansiyel m\u00fc\u015fterilere s\u0131n\u0131rl\u0131 bir \u00fccretsiz tan\u0131t\u0131m ile DDoS sald\u0131r\u0131lar\u0131 sunar. \u0130lk sald\u0131r\u0131lar s\u0131ras\u0131nda g\u00f6zlemledi\u011fimiz DDoS sald\u0131r\u0131 vekt\u00f6rlerinin ve sald\u0131r\u0131 hacimlerinin \u00e7o\u011fu, \u00fccretsiz \u00f6ny\u00fckleyiciler\/stresleyiciler arac\u0131l\u0131\u011f\u0131yla ger\u00e7ekle\u015ftirilebilir, ancak Rusya&#8217;ya kar\u015f\u0131 g\u00f6r\u00fclen daha b\u00fcy\u00fck sald\u0131r\u0131lar\u0131n baz\u0131lar\u0131, bu underground hizmetlerinin \u00e7o\u011fu i\u00e7in profil d\u0131\u015f\u0131ndad\u0131r ve muhtemelen baz\u0131 geleneklere i\u015faret etmektedir.<\/p>\n<p>Baz\u0131 sald\u0131r\u0131lar\u0131n, hem ki\u015fisel bilgisayarlar\u0131n (PC&#8217;ler) hem de IoT cihazlar\u0131n\u0131n \u00f6zel olarak kontrol edilen botnetlerinden yararland\u0131\u011f\u0131 da ortaya \u00e7\u0131kt\u0131. G\u00f6zlemlenen botnet kaynakl\u0131 sald\u0131r\u0131lar\u0131n t\u00fcm\u00fc, iyi bilinen DDoS sald\u0131r\u0131 vekt\u00f6rlerini kulland\u0131 ve Mirai, XOR.DDoS, Meris ve Dvinis gibi DDoS bot aileleriyle tutarl\u0131yd\u0131.<\/p>\n<p>Unutulmamal\u0131d\u0131r ki; \u00f6zellikle sald\u0131rganlar taraf\u0131ndan \u00f6ny\u00fckleyiciler\/stresleyiciler kullan\u0131ld\u0131\u011f\u0131nda, DDoS sald\u0131r\u0131lar\u0131n\u0131n ili\u015fkilendirilmesi \u00e7ok zordur. DDoS sald\u0131r\u0131lar\u0131n\u0131n \u00e7o\u011fu, sald\u0131rganlar\u0131n zay\u0131f operasyonel g\u00fcvenli\u011finden kaynaklan\u0131r. Di\u011fer durumlarda ortaya \u00e7\u0131kan sonu\u00e7, sald\u0131rganlar\u0131 tespit etmek i\u00e7in hem DDoS-kiral\u0131k servislerin hem de \u00f6zel DDoS sald\u0131r\u0131 botnetlerinin komuta ve kontrol (C2) altyap\u0131s\u0131na aktif olarak s\u0131zan g\u00fcvenlik ara\u015ft\u0131rmac\u0131lar\u0131, kolluk kuvvetleri ve istihbarat te\u015fkilatlar\u0131n\u0131n ortak \u00e7al\u0131\u015fma \u00fcr\u00fcn\u00fcd\u00fcr. NETSCOUT, sekt\u00f6rdeki en ayr\u0131nt\u0131l\u0131 DDoS sald\u0131r\u0131 analizi ve azaltma \u00f6nerilerini sa\u011flama konusunda uzmanla\u015fm\u0131\u015ft\u0131r ve sald\u0131r\u0131 niteli\u011fine odaklanmam\u0131\u015ft\u0131r.<\/p>\n<p><strong>Temel Bulgular<\/strong><\/p>\n<ul>\n<li>Rusya&#8217;ya y\u00f6nelik DDoS sald\u0131r\u0131lar\u0131, \u00e7at\u0131\u015fman\u0131n ba\u015flang\u0131c\u0131ndan bu yana her ay ~%236&#8217;dan fazla artt\u0131.<\/li>\n<li>Hem Rusya&#8217;y\u0131 hem de Ukrayna&#8217;y\u0131 hedef alan DDoS sald\u0131r\u0131lar\u0131n\u0131n s\u0131kl\u0131\u011f\u0131 ve hacmi \u00f6nemli \u00f6l\u00e7\u00fcde artarken, EMEA b\u00f6lgesine y\u00f6nelik sald\u0131r\u0131lar bir b\u00fct\u00fcn olarak 2021&#8217;in ayn\u0131 d\u00f6nemine g\u00f6re %32 azald\u0131.<\/li>\n<li>Bu d\u00f6nemde Rus \u00e7evrimi\u00e7i m\u00fclklerini hedef alan DDoS sald\u0131r\u0131lar\u0131, s\u0131ras\u0131yla 454 Gbps ve 173 mpps&#8217;lik en y\u00fcksek sald\u0131r\u0131 hacimlerine sahipti. Bu b\u00fcy\u00fckl\u00fckteki ve rejimdeki sald\u0131r\u0131lar, yaln\u0131zca ama\u00e7lanan hedeflere \u00f6nemli \u00f6l\u00e7\u00fcde olumsuz etki yapmakla kalmaz, ayn\u0131 zamanda bu \u00e7at\u0131\u015fmaya do\u011frudan dahil olmayan \u00f6rg\u00fctler ve y\u00f6netimlerde geni\u015f \u00e7apl\u0131 tali bozulmalara neden olabilir.<\/li>\n<li>Do\u011frudan yollu SYN, ACK ve RST ta\u015fk\u0131nlar\u0131n\u0131n yan\u0131 s\u0131ra DNS sorgusu floodlar\u0131ndan olu\u015fan bir bask\u0131nl\u0131kla Rus hedeflerine y\u00f6nelik sald\u0131r\u0131larda kullan\u0131lan \u00e7oklu DDoS vekt\u00f6rlerini g\u00f6zlemledik.<\/li>\n<\/ul>\n<p><strong>Analiz Raporu<\/strong><\/p>\n<p><strong>Atak S\u0131kl\u0131\u011f\u0131<\/strong><\/p>\n<p>Aktif Tehdit D\u00fczeyi Analiz Sistemi (ATLAS) DDoS sald\u0131r\u0131 istatistiklerimiz, Rusya&#8217;n\u0131n DDoS sald\u0131r\u0131lar\u0131nda aydan aya ~%236 art\u0131\u015f ya\u015fad\u0131\u011f\u0131n\u0131 ortaya koyuyor.<\/p>\n<p><strong>Atak S\u00fcresi Analizi<\/strong>Bug\u00fcne kadar, Rus m\u00fclklerine kar\u015f\u0131 g\u00f6zlemlenen sald\u0131r\u0131lar\u0131n bir\u00e7o\u011funun s\u00fcresi daha k\u0131sayd\u0131, bu da muhtemelen booter\/stres hizmetinin bir g\u00f6stergesiydi. Rus hedeflerine y\u00f6nelik DDoS sald\u0131r\u0131lar\u0131n\u0131n yakla\u015f\u0131k %60&#8217;\u0131, booter\/stresser hizmetlerinin kullan\u0131m\u0131yla tutarl\u0131yken, %40&#8217;\u0131n\u0131n botnet kaynakl\u0131 oldu\u011fu ortaya \u00e7\u0131kt\u0131. Bununla birlikte, sald\u0131rganlar, sald\u0131rgan\u0131n \u00f6demeye istekli olmas\u0131 ko\u015fuluyla, \u00f6ny\u00fckleyici\/stresleyici hizmetlerinde tipik s\u00fcre pencerelerini a\u015fabilir. Sald\u0131rganlar taraf\u0131ndan kullan\u0131lan belirli DDoS sald\u0131r\u0131 vekt\u00f6rleri ve ili\u015fkili sald\u0131r\u0131 hacimleriyle birlikte de\u011ferlendirildi\u011finde, bu, g\u00f6zlemlenen sald\u0131r\u0131lar\u0131n \u00e7o\u011funu ba\u015flatmak i\u00e7in standart \u00f6ny\u00fckleyici\/stresleyici kiralama DDoS hizmetlerinin kullan\u0131ld\u0131\u011f\u0131n\u0131 g\u00fc\u00e7l\u00fc bir \u015fekilde g\u00f6sterir.<\/p>\n<p><strong>Atak BantGeni\u015fli\u011fi (bps)<\/strong><\/p>\n<p>Rus kurulu\u015flar\u0131n\u0131, uygulamalar\u0131n\u0131, hizmetlerini, i\u00e7eri\u011fini ve di\u011fer \u00e7evrimi\u00e7i m\u00fclkleri hedef alan DDoS sald\u0131r\u0131lar\u0131nda \u00f6nemli bir art\u0131\u015f, Ukrayna&#8217;da kara operasyonlar\u0131n\u0131n ba\u015flat\u0131lmas\u0131yla ayn\u0131 zamana denk geldi. Yukar\u0131da belirtildi\u011fi gibi, Rusya ba\u011flam\u0131nda g\u00f6zlemledi\u011fimiz nispeten b\u00fcy\u00fck sald\u0131r\u0131lar, yaln\u0131zca hedeflenen kurulu\u015flar i\u00e7in internet operasyonlar\u0131n\u0131 kesintiye u\u011fratmakla kalmaz, ayn\u0131 zamanda bu \u00e7at\u0131\u015fmaya do\u011frudan dahil olmayan kurulu\u015flara, \u00fclkelere ve di\u011fer y\u00f6netimlere kar\u015f\u0131 geni\u015f kapsaml\u0131 side effectlere de sahip olabilir.<\/p>\n<p>\u00d6zellikle Ukrayna&#8217;y\u0131 hedefleyen sald\u0131r\u0131lar ba\u011flam\u0131n\u0131n \u00f6tesinde, \u00e7e\u015fitli ISP&#8217;ler, ticari DDoS azaltma hizmeti sa\u011flay\u0131c\u0131lar\u0131 ve kritik kamuya a\u00e7\u0131k \u00f6zelliklere sahip di\u011fer kurulu\u015flar, haz\u0131rl\u0131k ve durumsal fark\u0131ndal\u0131\u011fa odaklanmalar\u0131 nedeniyle terabit s\u0131n\u0131f\u0131 DDoS sald\u0131r\u0131lar\u0131n\u0131 ba\u015far\u0131yla azaltm\u0131\u015ft\u0131r. Kay\u0131tlara ge\u00e7en en b\u00fcy\u00fck sald\u0131r\u0131lardan baz\u0131lar\u0131 (2,5 Tbps ve 3,4 Tbps), hedeflenen kurulu\u015flar taraf\u0131ndan \u00e7ok az olumsuz etkiyle veya hi\u00e7 olumsuz etki olmaks\u0131z\u0131n ba\u015far\u0131yla hafifletildi. Bu olaylar, iyi tan\u0131mlanm\u0131\u015f, eksiksiz ve do\u011frulanm\u0131\u015f bir DDoS savunma plan\u0131na sahip olman\u0131n faydalar\u0131n\u0131 vurgular. Bu ISP&#8217;lerin ve halka a\u00e7\u0131k kritik \u00f6zelliklere sahip kurulu\u015flar\u0131n \u00e7o\u011fu, NETSCOUT DDoS savunma \u00e7\u00f6z\u00fcmlerinden yararlanarak ak\u0131ll\u0131 DDoS azaltma kapasitelerini birden \u00e7ok terabit\/saniyeye kadar \u00f6l\u00e7eklendirir.<\/p>\n<p><strong>Atak Throughputu (pps)<\/strong><\/p>\n<p>Hacim ve s\u00fcreye ek olarak, bir sald\u0131r\u0131n\u0131n h\u0131z\u0131 (verimi), bir sald\u0131r\u0131n\u0131n g\u00fcc\u00fcn\u00fc veya etkisini \u00f6l\u00e7mek i\u00e7in \u00f6nemli bir \u00f6l\u00e7\u00fcd\u00fcr. G\u00fc\u00e7, ayn\u0131 zamanda, kiral\u0131k DDoS platformlar\u0131n\u0131n sunucular\u0131n\u0131n ne kadar bant geni\u015fli\u011fi ve throughput \u00fcretebilece\u011fini a\u00e7\u0131klamak i\u00e7in kulland\u0131klar\u0131 bir terimdir. Throughput \u00e7ok b\u00fcy\u00fck \u00f6l\u00e7\u00fcde olabilir ve genellikle paket boyutuyla ters orant\u0131l\u0131d\u0131r; y\u00fcksek verimli DDoS sald\u0131r\u0131lar\u0131 tipik olarak daha k\u00fc\u00e7\u00fck paket boyutlar\u0131 i\u00e7erirken, y\u00fcksek bant geni\u015fli\u011fi sald\u0131r\u0131lar\u0131 tipik olarak daha b\u00fcy\u00fck (ve UDP tabanl\u0131 sald\u0131r\u0131lar durumunda genellikle par\u00e7alanm\u0131\u015f) paketleri i\u00e7erir. Unutmay\u0131n, g\u00fc\u00e7 her zaman hedef \u00fczerindeki ger\u00e7ek etkiye e\u015fit de\u011fildir. Bir\u00e7ok y\u00fcksek throughputlu sald\u0131r\u0131n\u0131n haz\u0131rl\u0131kl\u0131 kurulu\u015flar \u00fczerinde hi\u00e7bir etkisi olmad\u0131\u011f\u0131n\u0131 g\u00f6zlemledik; Ayr\u0131ca, nispeten d\u00fc\u015f\u00fck pps sald\u0131r\u0131lar\u0131n\u0131n, kapsaml\u0131, g\u00fcncel DDoS savunma planlar\u0131 ve belirlenmi\u015f m\u00fcdahale ekipleri olmayan kurulu\u015flar\u0131n \u0130nternet operasyonlar\u0131 \u00fczerinde orant\u0131s\u0131z bir olumsuz etkiye sahip oldu\u011funu g\u00f6rd\u00fck. Bu sald\u0131r\u0131lar s\u0131ras\u0131nda bug\u00fcne kadar g\u00f6zlemledi\u011fimiz en y\u00fcksek throughputa sahip DDoS sald\u0131r\u0131s\u0131, ~173mp\/sn&#8217;de \u00f6l\u00e7\u00fcld\u00fc.<\/p>\n<p><strong>DDoS Ataklar\u0131 Vekt\u00f6r Analizi<\/strong><\/p>\n<p>S\u00fcre, bant geni\u015fli\u011fi ve throughputa ek olarak, bir sald\u0131r\u0131da kullan\u0131lan DDoS Sald\u0131r\u0131 Vekt\u00f6rleri, sald\u0131r\u0131 verimlili\u011fi ve etkinli\u011fi i\u00e7in \u00f6nemli etkilere sahiptir. \u00d6rne\u011fin, \u00e7e\u015fitli UDP yans\u0131tma\/y\u00fckseltme sald\u0131r\u0131lar\u0131 t\u00fcrleri, son derece y\u00fcksek bant geni\u015fli\u011fi rejimlerine \u00f6l\u00e7eklenebilir, ancak belirli bir hedefe sald\u0131rmak i\u00e7in her zaman optimal de\u011fildir. Daha yetenekli sald\u0131rganlar, \u00e7abalar\u0131n\u0131 hedeflenen organizasyonun \u00f6zelliklerine g\u00f6re uyarlamak i\u00e7in s\u0131kl\u0131kla kapsaml\u0131 sald\u0131r\u0131 \u00f6ncesi ke\u015fifler yaparlar.<\/p>\n<p>Rusya&#8217;ya y\u00f6nelik DDoS sald\u0131r\u0131lar\u0131nda g\u00f6zlemlenen DDoS sald\u0131r\u0131 vekt\u00f6rleri, DNS ve SNMP yans\u0131tma\/b\u00fcy\u00fctme gibi iyi anla\u015f\u0131lm\u0131\u015f, rutin olarak kullan\u0131lan metodolojilerden olu\u015fuyordu; SYN, RST ve ACK ta\u015fmas\u0131; ve k\u00fc\u00e7\u00fck paket UDP ta\u015fmas\u0131. Rus hedeflerine kar\u015f\u0131 DNS sorgusu ta\u015fmas\u0131 da g\u00f6zlemlendi ve bu, potansiyel olarak daha karma\u015f\u0131k sald\u0131rganlar\u0131n dahil oldu\u011funu g\u00f6steriyor.<\/p>\n<p>Bu sald\u0131r\u0131lar boyunca Rus \u00e7evrimi\u00e7i m\u00fclklerini hedeflemek i\u00e7in kullan\u0131lan en yayg\u0131n olarak g\u00f6zlemlenen DDoS sald\u0131r\u0131 vekt\u00f6rleri, \u00e7e\u015fitli do\u011frudan yollu TCP flooding sald\u0131r\u0131lar\u0131d\u0131r; bu, DDoS sald\u0131r\u0131 vekt\u00f6rlerinde \u00f6l\u00e7eklerin yeniden dengelendi\u011fi en son Tehdit \u0130stihbarat Raporumuzda vurgulad\u0131\u011f\u0131m\u0131z, do\u011frudan yollu sald\u0131r\u0131lar\u0131n artan kullan\u0131m\u0131n\u0131n k\u00fcresel e\u011filimiyle uyumludur. Daha fazla d\u00fc\u015fman, botnet&#8217;lerden kaynaklanan do\u011frudan yollu, sahte olmayan TCP ve UDP tabanl\u0131 floodlar\u0131 kullan\u0131yor.<\/p>\n<p><strong>Rusya Botnet Analizi<\/strong><\/p>\n<p>Ukrayna DDoS tehdidine genel bak\u0131\u015f\u0131m\u0131zda, 2022 y\u0131l\u0131n\u0131n \u015eubat ay\u0131n\u0131n ortalar\u0131nda Ukrayna&#8217;da yeni bir botnet&#8217;in ortaya \u00e7\u0131kmas\u0131ndan bahsettik. Rusya&#8217;da yeni ortaya \u00e7\u0131kan botnetleri g\u00f6rmesek de, Rusya kaynakl\u0131 botnet aktivitesinde genel bir d\u00fc\u015f\u00fc\u015f g\u00f6rd\u00fck.<\/p>\n<p><strong>End\u00fcstri ve Organizasyon Hedeflemesi <\/strong><\/p>\n<p>Birka\u00e7 kurulu\u015f, Rusya&#8217;ya y\u00f6nelik devam eden sald\u0131r\u0131larla ilgili DDoS sald\u0131r\u0131lar\u0131n\u0131n, me\u015fru m\u00fc\u015fterilere veya kurulu\u015flara verilen hizmeti kesintiye u\u011fratt\u0131\u011f\u0131n\u0131 a\u00e7\u0131k\u00e7a belirtti. Rusya&#8217;daki birden fazla devlet kurumu da d\u0131\u015f web sitelerine ve hizmetlerine y\u00f6nelik sald\u0131r\u0131lar bildirdi. Kamuya a\u00e7\u0131k olarak bildirilen bu sald\u0131r\u0131lar\u0131n bir\u00e7o\u011funu ba\u011f\u0131ms\u0131z olarak do\u011frulayabildik ve sald\u0131r\u0131 hedeflemesini yak\u0131ndan takip etmeye devam ettik.<\/p>\n<p><strong>Ataklar\u0131 Giderme ve Ataklardan Korunma<\/strong><\/p>\n<p>NETSCOUT Arbor DDoS savunma \u00e7\u00f6z\u00fcmleri (SP\/TMS, AED ve Arbor Cloud), Ukrayna&#8217;ya y\u00f6nelik devam eden sald\u0131r\u0131lar s\u0131ras\u0131nda bug\u00fcne kadar kullan\u0131lan t\u00fcm DDoS sald\u0131r\u0131 metodolojileri dahil olmak \u00fczere her t\u00fcrl\u00fc DDoS sald\u0131r\u0131s\u0131n\u0131 ba\u015far\u0131yla azaltmak i\u00e7in kullan\u0131labilecek evrensel kar\u015f\u0131 \u00f6nlemleri ve korumalar\u0131 i\u00e7erir. Bununla birlikte, kurulu\u015flar\u0131n a\u015fa\u011f\u0131daki eylemleri ger\u00e7ekle\u015ftirmesini \u015fiddetle tavsiye ediyoruz:<\/p>\n<ul>\n<li>Y\u00fcksek d\u00fczeyde durumsal fark\u0131ndal\u0131k sa\u011flay\u0131n ve s\u00fcrekli risk de\u011ferlendirmesi yap\u0131n.<\/li>\n<li>Halka a\u00e7\u0131k t\u00fcm kritik sunucular\u0131n, hizmetlerin, uygulamalar\u0131n, i\u00e7eri\u011fin ve destekleyici altyap\u0131n\u0131n DDoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 yeterince korundu\u011funu d\u00fczenli olarak do\u011frulay\u0131n.<\/li>\n<li>DDoS savunma planlar\u0131n\u0131n, azaltma ortakl\u0131klar\u0131n\u0131n ve ileti\u015fim planlar\u0131n\u0131n g\u00fcncel oldu\u011fundan, mevcut yap\u0131land\u0131rmalar\u0131 ve operasyonel ko\u015fullar\u0131 yans\u0131tt\u0131\u011f\u0131ndan ve gerekti\u011fi gibi ba\u015far\u0131yla uygulanabileceklerini do\u011frulamak i\u00e7in periyodik olarak test edildi\u011finden emin olun.<\/li>\n<li>En son Netscout ASERT&#8217;nin halka a\u00e7\u0131k DDoS sald\u0131r\u0131 analizini ve geni\u015f \u00e7apta uygulanabilir savunma \u00f6nerilerini almak i\u00e7in bu web g\u00fcnl\u00fc\u011f\u00fcn\u00fcn sendikasyon beslemesine abone olun.<\/li>\n<\/ul>\n<p><strong>Sonu\u00e7<\/strong><\/p>\n<p>Pop\u00fcler inan\u0131\u015f\u0131n aksine, DDoS sald\u0131r\u0131lar\u0131 genellikle do\u011fas\u0131 gere\u011fi i\u015flemsel de\u011fildir; Nispeten d\u00fc\u015f\u00fck hacimli sald\u0131r\u0131lar bile kurulu\u015flar, \u00fclkeler ve bu \u00e7at\u0131\u015fmaya do\u011frudan dahil olmayan di\u011fer y\u00f6netimler \u00fczerinde \u00f6nemli yan etkilere neden olabilir. Kurulu\u015flar \u00f6zellikle tetikte olmal\u0131 ve etkilenen t\u00fcm taraflar ile i\u015f ortakl\u0131klar\u0131na veya di\u011fer ticari veya k\u00fclt\u00fcrel ili\u015fkilere dayanan kas\u0131tl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 tetikte olmal\u0131d\u0131r.<\/p>\n<p>Bu sald\u0131r\u0131lar s\u0131ras\u0131nda \u015fimdiye kadar kullan\u0131lan DDoS sald\u0131r\u0131 vekt\u00f6rlerinin t\u00fcm\u00fc iyi anla\u015f\u0131lm\u0131\u015ft\u0131r; ayn\u0131 \u015fekilde, g\u00f6zlemlenen sald\u0131r\u0131 hacimleri de tarihsel normlar dahilindedir. Kurulu\u015flar, sald\u0131r\u0131lara kar\u015f\u0131 dayan\u0131kl\u0131l\u0131klar\u0131n\u0131 sa\u011flamak i\u00e7in end\u00fcstri standard\u0131 en iyi g\u00fcncel uygulamalar\u0131 (BCP&#8217;ler) ve g\u00fcncel, duruma g\u00f6re uygun DDoS savunmalar\u0131n\u0131 uygulamal\u0131d\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Y\u00f6netici \u00d6zeti NETSCOUT Arbor Siber G\u00fcvenlik M\u00fchendisli\u011fi ve M\u00fcdahale Ekibi (ASERT), 2022 \u015eubat ay\u0131n\u0131n ortas\u0131ndan bu yana Rusya ve Ukrayna&#8217;daki durumu izliyor. K\u0131sa s\u00fcre \u00f6nce, Ukrayna&#8217;daki kurulu\u015flar\u0131, a\u011flar\u0131, uygulamalar\u0131 ve hizmetleri hedef alan devam eden y\u00fcksek profilli DDoS sald\u0131r\u0131lar\u0131n\u0131n ilk teknik analizine y\u00f6nelik bir g\u00fcncelleme&#8230;<\/p>","protected":false},"author":2,"featured_media":8111,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[],"class_list":["post-8110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/rusya-ddos-tehdit-genel-gorunumu\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"Y\u00f6netici \u00d6zeti NETSCOUT Arbor Siber G\u00fcvenlik M\u00fchendisli\u011fi ve M\u00fcdahale Ekibi (ASERT), 2022 \u015eubat ay\u0131n\u0131n ortas\u0131ndan bu yana Rusya ve Ukrayna&#8217;daki durumu izliyor. K\u0131sa s\u00fcre \u00f6nce, Ukrayna&#8217;daki kurulu\u015flar\u0131, a\u011flar\u0131, uygulamalar\u0131 ve hizmetleri hedef alan devam eden y\u00fcksek profilli DDoS sald\u0131r\u0131lar\u0131n\u0131n ilk teknik analizine y\u00f6nelik bir g\u00fcncelleme...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/rusya-ddos-tehdit-genel-gorunumu\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-25T08:43:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"270\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc\",\"datePublished\":\"2022-05-25T08:43:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/\"},\"wordCount\":2184,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp\",\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/\",\"url\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/\",\"name\":\"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp\",\"datePublished\":\"2022-05-25T08:43:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp\",\"width\":480,\"height\":270},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/rusya-ddos-tehdit-genel-gorunumu\/","og_locale":"en_GB","og_type":"article","og_title":"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc - Inforte Bili\u015fim A.\u015e.","og_description":"Y\u00f6netici \u00d6zeti NETSCOUT Arbor Siber G\u00fcvenlik M\u00fchendisli\u011fi ve M\u00fcdahale Ekibi (ASERT), 2022 \u015eubat ay\u0131n\u0131n ortas\u0131ndan bu yana Rusya ve Ukrayna&#8217;daki durumu izliyor. K\u0131sa s\u00fcre \u00f6nce, Ukrayna&#8217;daki kurulu\u015flar\u0131, a\u011flar\u0131, uygulamalar\u0131 ve hizmetleri hedef alan devam eden y\u00fcksek profilli DDoS sald\u0131r\u0131lar\u0131n\u0131n ilk teknik analizine y\u00f6nelik bir g\u00fcncelleme...","og_url":"https:\/\/www.inforte.com\/en\/rusya-ddos-tehdit-genel-gorunumu\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2022-05-25T08:43:03+00:00","og_image":[{"width":480,"height":270,"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp","type":"image\/webp"}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc","datePublished":"2022-05-25T08:43:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/"},"wordCount":2184,"commentCount":0,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp","articleSection":["Inforte Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/","url":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/","name":"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp","datePublished":"2022-05-25T08:43:03+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2022\/05\/Web_Header-NS_Mobile_Networks_Map.webp","width":480,"height":270},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/rusya-ddos-tehdit-genel-gorunumu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Rusya DDoS Tehdit Genel G\u00f6r\u00fcn\u00fcm\u00fc"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8110"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=8110"}],"version-history":[{"count":1,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8110\/revisions"}],"predecessor-version":[{"id":8113,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/8110\/revisions\/8113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media\/8111"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=8110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=8110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=8110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}