The distributed denial-of-service (DDoS) attack is the classic cheap hack. It requires virtually nothing of those who wield it beyond the ability to download something from the internet, yet a DDoS offers unusually public consequences (most real security breaches happen in the dark). It is also difficult to defend against, in some part because it doesn’t involve actually breaching a network at all—just flooding it with more innocuous-seeming traffic than it can handle.
As described in the current issue of IEEE Computer, security researchers from George Mason University have developed a new defensive strategy that they claim can thwart DDoS attacks through a process of client-server connection “shuffling.”
Read more at Motherboard