• DDoS Knowledge Center
    • DDoS Chronicles
    • Research
    • DDoSPedia
    • Infographics
  • DDoS Threats & Attacks
    • DDoS Attack Types & Tools
    • Threat Advisories & Attack Reports
  • DDoS Experts' Insider
    • DDoS Best Practices and Guidelines
    • ERT Case Studies
    • Expert Talk
    • Hacker's Corner
    • Losing Sleep in the C-Suite
  • IoT
    • IoT Insights
  • Malware
    • Malware Alerts
  • Contact Us
  • Search

What are you looking for?

  • DDoS Attack Definitions - DDoSPedia

    DDoSPedia is a glossary that focuses on network and application security terms with many distributed denial-of-service (DDoS)-related definitions. It provides a central place for hard to find web-scattered definitions on DDoS attacks.

  • Search

    Operation Payback

    Operation Payback was a series of retaliatory cyber attacks by the hacker group Anonymous against opponents of Internet copyright infringement. It began in 2010 when several Bollywood companies hired 3rd party Aiplex Software to launch distributed denial-of-service ( DDoS ) attacks on websites that did not respond to notices asking them to remove copyright-infringing content from their servers.

    Anonymous responded by launching Operation Payback, initially attempting to use a DDoS attack to take down Aiplex Software (although they soon discovered that another individual had already done so a few hours before their planned coordinated attack). Further attacks against anti-copyright infringement organizations followed, with targets including: the Motion Picture Association of America (MPAA), the International Federation of the Phonographic Industry, the Recording Industry Association of America (RIAA), the British Phonographic Industry, and various law firms that prosecuted copyright infringement.

  • DDoSPedia Index

    #

    • #OpIsrael
    • #RefRef

    A

    • ADB Miner
    • Admin.HLP
    • Advanced Persistent Attack
    • Amplification Attack
    • Anonymous
    • Apache Killer
    • Application Misuse Attack
    • ARP Poisoning
    • Asymmetric Attack

    B

    • Backdoor
    • BEAST
    • Booster Script
    • Border Gateway Protocol (BGP) Attack
    • Botmaster
    • Botnet
    • Boy-in-the-Browser Attack
    • BrickerBot
    • Buffer Overflow Attack
    • ByteDoS

    C

    • CERT
    • Clean Pipe
    • Clearnet
    • Click Fraud
    • Clickjacking
    • CoAP
    • Command and Control Server
    • Conflicker
    • Cookie
    • Cookie Poisoning
    • Counter-attack
    • Cryptovirus
    • CutWail Botnet
    • CVE
    • Cyber Ransom

    D

    • Darknet
    • Darkness (Optima)
    • DarkSky
    • Dark Web
    • Deep Web
    • Digital Fraud
    • Distributed Denial-of-Service (DDoS) Attack
    • DNS Amplification Attack
    • DNS Flood
    • DoS (Denial-of-Service) Attack
    • DROWN
    • DrDos Attack
    • Duqu
    • Dynamic Web Injection

    E

    • Exploit

    F

    • Flame
    • Flood
    • Forged Cookie
    • FREAK
    • Fraggle Attack
    • Fragmented ACK Attack

    G

    • Guy Fawkes Mask

    H

    • Hacker
    • Hacktivist
    • Hijackware
    • HEARTBLEED
    • High-rate Attack
    • HOIC (High Orbit Ion Cannon)
    • Honeypot
    • Hping
    • HTTP
    • HTTPS
    • HTTPS Flood
    • HTTP Challenge
    • HTTP Cookie
    • HTTP Flood
    • HTTP Fragmentation Attack

    I

    • I2P (Invisible Internet Project)
    • ICMP Flood
    • Impression Fraud
    • Ingress Filtering (InFilter)
    • Internet Pipe Saturation
    • IP Address
    • IP Spoofing
    • IRC (Internet Relay Chat)
    • ISP (Internet Service Provider)
    • itsoknoproblembro
    • Izz ad-Din al-Qassam Cyber Fighters

    J

    • JenX
    • JS Cookie Challenges

    K

    • Keylogging

    L

    • LAND Attack
    • LOIC (Low Orbit Ion Cannon)
    • Low-rate Attack
    • LulzSec

    M

    • MalSpam
    • Malware
    • Man-in-the-Browser Attack
    • Man-in-the-Middle Attack
    • Memcached
    • Mirai
    • Mitigating Controls
    • Mobile LOIC
    • Morris Worm
    • MSSP
    • Multi-Factor Authentication
    • Mydoom

    N

    • Naptha Attacks
    • Necurs
    • Network Scan
    • Nuke

    O

    • Open DNS Resolver
    • Operation Ababil
    • Operation AntiSec
    • Operation Blackout
    • Operation Defense
    • Operation Killing Bay
    • Operation Payback
    • OpIcarus
    • OpIsrael
    • OpKillingBay
    • OpSingleGateway

    P

    • Packet
    • Pandex Botnet
    • Password Spraying
    • Parasiteware
    • Peer to Peer Attack
    • Ping of Death
    • PitbullBot
    • POODLE
    • Port Scan
    • Pushdo Botnet
    • Putinstresser
    • Pyloris

    Q

    No terms currently listed.

    R

    • Ransomware
    • Ransom DDoS
    • Rate Limit
    • RFI/LFI
    • Reflector/Reflective DoS attacks
    • Reflector server
    • Resident Virus
    • R.U.D.Y. (R-U-Dead-Yet?)

    S

    • Scareware
    • Scrubbing Center
    • Session Hijacking
    • SIP Register flood
    • SIP Malformed Attack
    • SIP Server Flood
    • SIP brute force
    • SIP Client Call Flood
    • Slow-Rate Attack
    • Slowloris
    • Smurf Attack
    • Social Engineering
    • SSL
    • SSL Stripping
    • Sockstress
    • SQL Injection
    • SSL Garbage Flood
    • Stabuniq
    • Static Web Injection
    • Stuxnet
    • Supply Chain Attack
    • SYN-ACK Flood
    • SYN cookies
    • SYN Flood

    T

    • Topera
    • Tor's Hammer
    • TOR
    • TCP Flood
    • Trin00
    • TheWikiBoat
    • THC-SSL DoS
    • Traffic
    • Trickbot
    • Trojan Horse
    • TDL-4 (Alureon)
    • TCP Window Scaling
    • Teardrop Attack
    • TLS

    U

    • UDP Flood

    V

    • Vulnerability
    • Vulnerability Scanner

    W

    • WannaCry
    • Wireshark
    • Web Scraping
    • Web Application Security
    • Worm

    X

    • XerXeS

    Y

    No terms currently listed.

    Z

    • Zeus
    • Zero-Day/Zero-Minute Attack
    • Zombie
Top
DDoS Knowledge Center
  • DDoS Chronicles
  • Research
  • DDoS Definitions - DDoSPedia
  • Infographics
DDoS Threats and Attacks
  • DDoS Attack Types
  • DDoS Ring of Fire
  • Threat Advisories and Attack Reports
DDoS Experts' Insider
  • Losing Sleep in the C-Suite
  • Expert Talk
  • ERT Case Studies
radware.com
  • Security
  • SSL Attack Protection
  • Application & Network Security

© Radware Ltd. 2019 All Rights Reserved | Privacy Policy | Feedback |

  • Radware Blog
  • Twitter
  • LinkedIn
  • YouTube
  • facebook