We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

This DoS goes loop-di-loop

Formal Metadata

Title
This DoS goes loop-di-loop
Subtitle
Preventing DoS attacks in your Node.js application
Title of Series
Number of Parts
637
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language
Production Year2021

Content Metadata

Subject Area
Genre
Abstract
Node.js’ single-threaded nature makes it very susceptible to DOS attacks. While Node.js’ event loop allows performing some operations in an asynchronous fashion, it’s still quite easy to write a vulnerable Node.js application by making a few simple mistakes. In this talk I’ll cover some common ways a Node.js application may be vulnerable to DoS attacks and some common best-practices and counter measures to defend against such attacks.