A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used with regards to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.
One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.
Denial-of-service attacks can also lead to problems in the network 'branches' around the actual computer being attacked. For example, the bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network.
If the attack is conducted on a sufficiently large scale, entire geographical regions of Internet connectivity can be compromised without the attacker's knowledge or intent by incorrectly configured or flimsy network infrastructure equipment.
A DoS attack can be perpetrated in a number of ways. The five basic types of attack are:
# Consumption of computational resources, such as bandwidth, disk space, or processor time. # Disruption of configuration information, such as routing information. # Disruption of state information, such as unsolicited resetting of TCP sessions. # Disruption of physical network components. # Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
A DoS attack may include execution of malware intended to:
A smurf attack is one particular variant of a flooding DoS attack on the public Internet. It relies on misconfigured network devices that allow packets to be sent to all computer hosts on a particular network via the broadcast address of the network, rather than a specific machine. The network then serves as a smurf amplifier. In such an attack, the perpetrators will send large numbers of IP packets with the source address faked to appear to be the address of the victim. The network's bandwidth is quickly used up, preventing legitimate packets from getting through to their destination. To combat Denial of Service attacks on the Internet, services like the Smurf Amplifier Registry have given network service providers the ability to identify misconfigured networks and to take appropriate action such as filtering.
Ping flood is based on sending the victim an overwhelming number of ping packets, usually using the "ping" command from unix-like hosts (the -t flag on Windows systems has a far less malignant function). It is very simple to launch, the primary requirement being access to greater bandwidth than the victim.
Ping of death is based on sending the victim a malformed ping packet, which might lead to a system crash.
Around September 2009, a vulnerability in Windows Vista was referred to as a "teardrop attack", but the attack targeted SMB2 which is a higher layer than the TCP packets that teardrop used.
The Low-rate DoS (LDoS) attack exploits TCP’s slow-time-scale dynamics of retransmission time-out (RTO) mechanisms to reduce TCP throughput. Basically, an attacker can cause a TCP flow to repeatedly enter a RTO state by sending high-rate, but short-duration bursts, and repeating periodically at slower RTO time-scales. The TCP throughput at the attacked node will be significantly reduced while the attacker will have low average rate making it difficult to be detected.
Also see Sockstress.
While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses. Even if a mitigation device can keep blocking IP addresses, there are other problems to consider. For instance, there is a brief moment where the connection is opened on the server side before the signature itself comes through. Only once the connection is opened to the server can the identifying signature be sent and detected, and the connection torn down. Even tearing down connections takes server resources and can harm the server.
This method of attack can be prevented by specifying in the peer-to-peer protocol which ports are allowed or not. If port 80 is not allowed, the possibilities for attack on websites can be very limited.
The PDoS is a pure hardware targeted attack which can be much faster and requires fewer resources than using a botnet in a DDoS attack. Because of these features, and the potential and high probability of security exploits on Network Enabled Embedded Devices (NEEDs), this technique has come to the attention of numerous hacker communities. PhlashDance is a tool created by Rich Smith (an employee of Hewlett-Packard's Systems Security Lab) used to detect and demonstrate PDoS vulnerabilities at the 2008 EUSecWest Applied Security Conference in London.
Various DoS-causing exploits such as buffer overflow can cause server-running software to get confused and fill the disk space or consume all available memory or CPU time.
Other kinds of DoS rely primarily on brute force, flooding the target with an overwhelming flux of packets, oversaturating its connection bandwidth or depleting the target's system resources. Bandwidth-saturating floods rely on the attacker having higher bandwidth available than the victim; a common way of achieving this today is via Distributed Denial of Service, employing a botnet. Other floods may use specific packet types or connection requests to saturate finite resources by, for example, occupying the maximum number of open connections or filling the victim's disk space with logs.
A "banana attack" is another particular type of DoS. It involves redirecting outgoing messages from the client back onto the client, preventing outside access, as well as flooding the client with the sent packets.
An attacker with access to a victim's computer may slow it until it is unusable or crash it by using a fork bomb.
A specific example of a nuke attack that gained some prominence is the WinNuke, which exploited the vulnerability in the NetBIOS handler in Windows 95. A string of out-of-band data was sent to TCP port 139 of the victim's machine, causing it to lock up and display a Blue Screen of Death (BSOD).
Malware can carry DDoS attack mechanisms; one of the better-known examples of this was MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS involved hardcoding the target IP address prior to release of the malware and no further interaction was necessary to launch the attack.
A system may also be compromised with a trojan, allowing the attacker to download a zombie agent (or the trojan may contain one). Attackers can also break into systems using automated tools that exploit flaws in programs that listen for connections from remote hosts. This scenario primarily concerns systems acting as servers on the web.
Stacheldraht is a classic example of a DDoS tool. It utilizes a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents, which in turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using automated routines to exploit vulnerabilities in programs that accept remote connections running on the targeted remote hosts. Each handler can control up to a thousand agents.
These collections of systems compromisers are known as botnets. DDoS tools like Stacheldraht still use classic DoS attack methods centered on IP spoofing and amplification like smurf attacks and fraggle attacks (these are also known as bandwidth consumption attacks). SYN floods (also known as resource starvation attacks) may also be used. Newer tools can use DNS servers for DoS purposes. See next section.
Simple attacks such as SYN floods may appear with a wide range of source IP addresses, giving the appearance of a well distributed DoS. These flood attacks do not require completion of the TCP three way handshake and attempt to exhaust the destination SYN queue or the server bandwidth. Because the source IP addresses can be trivially spoofed, an attack could come from a limited set of sources, or may even originate from a single host. Stack enhancements such as syn cookies may be effective mitigation against SYN queue flooding, however complete bandwidth exhaustion may require involvement.
Unlike MyDoom's DDoS mechanism, botnets can be turned against any IP address. Script kiddies use them to deny the availability of well known websites to legitimate users. More sophisticated attackers use DDoS tools for the purposes of extortion — even against their business rivals.
It is important to note the difference between a DDoS and DoS attack. If an attacker mounts an attack from a single host it would be classified as a DoS attack. In fact, any attack against availability would be classed as a Denial of Service attack. On the other hand, if an attacker uses many systems to simultaneously launch attacks against a remote host, this would be classified as a DDoS attack.
The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track down and shut down. These attacker advantages cause challenges for defense mechanisms. For example, merely purchasing more incoming bandwidth than the current volume of the attack might not help, because the attacker might be able to simply add more attack machines.
It should be noted that in some cases a machine may become part of a DDoS attack with the owner's consent. An example of this is the 2010 DDoS attack against major credit card companies by supporters of WikiLeaks. In cases such as this, supporters of a movement (in this case, those opposing the arrest of WikiLeaks founder Julian Assange) choose to download and run DDoS software.
ICMP Echo Request attacks (Smurf Attack) can be considered one form of reflected attack, as the flooding host(s) send Echo Requests to the broadcast addresses of mis-configured networks, thereby enticing many hosts to send Echo Reply packets to the victim. Some early DDoS programs implemented a distributed form of this attack.
Many services can be exploited to act as reflectors, some harder to block than others. DNS amplification attacks involve a new mechanism that increased the amplification effect, using a much larger list of DNS servers than seen earlier.
An example of this occurred when Michael Jackson died in 2009. Websites such as Google and Twitter slowed down or even crashed. Many sites' servers thought the requests were from a virus or spyware trying to cause a Denial of Service attack, warning users that their queries looked like "automated requests from a computer virus or spyware application".
News sites and link sites — sites whose primary function is to provide links to interesting content elsewhere on the Internet — are most likely to cause this phenomenon. The canonical example is the Slashdot effect. Sites such as Digg, the Drudge Report, Fark, Something Awful, and the webcomic Penny Arcade have their own corresponding "effects", known as "the Digg effect", being "drudged", "farking", "goonrushing" and "wanging"; respectively.
Routers have also been known to create unintentional DoS attacks, as both D-Link and Netgear routers have created NTP vandalism by flooding NTP servers without respecting the restrictions of client types or geographical limitations.
Similar unintentional denials of service can also occur via other media, e.g. when a URL is mentioned on television. If a server is being indexed by Google or another search engine during peak periods of activity, or does not have a lot of available bandwidth while being indexed, it can also experience the effects of a DoS attack.
Legal action has been taken in at least one such case. In 2006, Universal Tube & Rollform Equipment Corporation sued YouTube: massive numbers of would-be youtube.com users accidentally typed the tube company's URL, utube.com. As a result, the tube company ended up having to spend large amounts of money on upgrading their bandwidth.
In February 2001, the Irish Government's Department of Finance server was hit by a denial of service attack carried out as part of a student campaign from NUI Maynooth. The Department officially complained to the University authorities and a number of students were disciplined.
In July 2002, the Honeynet Project Reverse Challenge was issued. The binary that was analyzed turned out to be yet another DDoS agent, which implemented several DNS related attacks, including an optimized form of a reflection attack.
On two occasions to date, attackers have performed DNS Backbone DDoS Attacks on the DNS root servers. Since these machines are intended to provide service to all Internet users, these two denial of service attacks might be classified as attempts to take down the entire Internet, though it is unclear what the attackers' true motivations were. The first occurred in October 2002 and disrupted service at 9 of the 13 root servers. The second occurred in February 2007 and caused disruptions at two of the root servers.
In February 2007, more than 10,000 online game servers in games such as Return to Castle Wolfenstein, Halo, Counter-Strike and many others were attacked by the hacker group RUS. The DDoS attack was made from more than a thousand computer units located in the republics of the former Soviet Union, mostly from Russia, Uzbekistan and Belarus. Minor attacks are still continuing to be made today.
In the weeks leading up to the five-day 2008 South Ossetia war, a DDoS attack directed at Georgian government sites containing the message: "win+love+in+Rusia" effectively overloaded and shut down multiple Georgian servers. Websites targeted included the Web site of the Georgian president, Mikhail Saakashvili, rendered inoperable for 24 hours, and the National Bank of Georgia. While heavy suspicion was placed on Russia for orchestrating the attack through a proxy, the St. Petersburg-based criminal gang known as the Russian Business Network, or R.B.N, the Russian government denied the allegations, stating that it was possible that individuals in Russia or elsewhere had taken it upon themselves to start the attacks.
During the 2009 Iranian election protests, foreign activists seeking to help the opposition engaged in DDoS attacks against Iran's government. The official website of the Iranian government (ahmedinejad.ir) was rendered inaccessible on several occasions. Critics claimed that the DDoS attacks also cut off internet access for protesters inside Iran; activists countered that, while this may have been true, the attacks still hindered President Mahmoud Ahmadinejad's government enough to aid the opposition.
On June 25, 2009, the day Michael Jackson died, the spike in searches related to Michael Jackson was so big that Google News initially mistook it for an automated attack. As a result, for about 25 minutes, when some people searched Google News they saw a "We're sorry" page before finding the articles they were looking for.
June 2009 the P2P site The Pirate Bay was rendered inaccessible due to a DDoS attack. This was most likely provoked by the recent sellout to Global Gaming Factory X AB, which was seen as a "take the money and run" solution to the website's legal issues. In the end, due to the buyers' financial troubles, the site was not sold.
On August 6, 2009 several social networking sites, including Twitter, Facebook, Livejournal, and Google blogging pages were hit by DDoS attacks, apparently aimed at Georgian blogger "Cyxymu". Although Google came through with only minor set-backs, these attacks left Twitter crippled for hours and Facebook did eventually restore service although some users still experienced trouble. Twitter's Site latency has continued to improve, however some web requests continue to fail.
In July and August 2010, the Irish Central Applications Office server was hit by a denial of service attack on four separate occasions, causing difficulties for thousands of Second Level students who are required to use the CAO to apply for University and College places. The attack is currently subject to a Garda investigation.
On November 28, 2010, whistle blower site wikileaks.org experienced a DDoS attack. This was presumably related to the pending release of many thousands of secret diplomatic cables.
On December 8, 2010, a group calling themselves "Anonymous" launched orchestrated DDoS attacks on organizations such as Mastercard.com, PayPal, Visa.com and PostFinance; as part of the ongoing "Operation Payback" campaign, which originally targeted anti-piracy organizations, in support of the Whistleblowing site Wikileaks and its founder, Julian Assange. The attack brought down the Mastercard, PostFinance, and Visa websites successfully by deploying 3 versions of the Denial of Service tool. PostFinance, the bank that had frozen Julian Assange’s account, was brought down for more than 16 hours due to the attacks. However, in denial of the fact that it was taken down by a bunch of notorious internet users, the bank issued a statement that the outage was caused by an overload of inquiries:
:"Access to www.postfinance.ch and thus also e-finance is currently overloaded owing to a multitude of online enquiries. The security of customer data is not affected."
Some examples of such tools are hping and socket programming but these are not the only programs capable of such attacks. Such tools are intended for benign use, but they can also be utilized in launching attacks on victim networks. In addition to these tools, there exist a vast amount of underground tools used by attackers.
Some stateful firewalls, like OpenBSD's pf(4) packet filter, can act as a proxy for connections: the handshake is validated (with the client) instead of simply forwarding the packet to the destination. It is available for other BSDs as well. In that context, it is called "synproxy".
These schemes will work as long as the DoS attacks are something that can be prevented by using them. For example SYN flood can be prevented using delayed binding or TCP splicing. Similarly content based DoS can be prevented using deep packet inspection. Attacks originating from dark addresses or going to dark addresses can be prevented using Bogon filtering. Automatic rate filtering can work as long as you have set rate-thresholds correctly and granularly. Wan-link failover will work as long as both links have DoS/DDoS prevention mechanism.
An ASIC based IPS can detect and block denial of service attacks because they have the processing power and the granularity to analyze the attacks and act like a circuit breaker in an automated way.
A rate-based IPS (RBIPS) must analyze traffic granularly and continuously monitor the traffic pattern and determine if there is traffic anomaly. It must let the legitimate traffic flow while blocking the DoS attack traffic.
Like IPS, a purpose-built system, such as the well-known Top Layer IPS products, can detect and block denial of service attacks at much nearer line speed than a software based system.
Sinkholing routes to a valid IP address which analyzes traffic and rejects bad ones. Sinkholing is not efficient for most severe attacks.
Prolexic and Verisign are examples of providers of this service.
If the attacker is spoofing source addresses randomly, the backscatter response packets from the victim will be sent back to random destinations. This effect can be used by network telescopes as indirect evidence of such attacks.
The term "backscatter analysis" refers to observing backscatter packets arriving at a statistically significant portion of the IP address space to determine characteristics of DoS attacks and victims.
In the US, there can be a serious federal crime under the Computer Fraud and Abuse Act with penalties that include years of imprisonment. Many other countries have similar laws.
Category:Denial-of-service attacks Category:Internet Relay Chat Category:Cyberwarfare Category:Computer network security
ar:هجمات الحرمان من الخدمات bn:ডিনাইয়াল অভ সার্ভিস bg:Атака за отказ на услуга ca:Denegació de servei cs:Denial of Service da:DDoS de:Denial of Service et:Teenusetõkestamise rünne el:Επιθέσεις άρνησης υπηρεσιών es:Ataque de denegación de servicio eu:Zerbitzu ukapenaren eraso fa:انکار سرویس fr:Attaque par déni de service ga:Ionsaí diúltaithe seirbhíse ko:서비스 거부 공격 hy:DDos գրոհ hr:DDoS id:Serangan DoS it:Denial of service he:התקפת מניעת שירות hu:DDoS mk:DDoS ml:ഡിനയിൽ-ഓഫ്-സർവീസ് അറ്റാക്ക് ms:DDoS my:Denial-of-service attack nl:Distributed denial-of-service ja:DoS攻撃 no:Tjenestenektangrep pl:DoS pt:Ataque de negação de serviço ro:DoS ru:DoS-атака simple:Denial-of-Service attack sl:Napad za zavrnitev storitve fi:Palvelunestohyökkäys sv:Denial of Service uk:DoS-атака vi:Tấn công từ chối dịch vụ zh:分散式阻斷服務攻擊This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
Coordinates | 29°57′53″N90°4′14″N |
---|---|
name | Anderson Silva |
other names | The Spider |
birth name | Anderson da Silva |
nationality | Brazilian |
birth date | April 14, 1975 |
birth place | São Paulo, Brazil |
other names | The Spider |
residence | Curitiba, Brazil |
fighting out of | Torrance, California, United States |
height | |
weight lb | 184 |
weight class | Welterweight (pre-2003) Middleweight Light Heavyweight |
reach in | 77.6 |
style | Muay Thai, Boxing, Brazilian Jiu-Jitsu, Taekwondo, Judo, Capoeira |
trainer | Boxing: Josuel Distak Jiu-Jitsu: Antonio Rodrigo Nogueira, Sylvio Behring and Ramon Lemos |
team | Black House |
stance | Southpaw |
rank | Black belt in Brazilian Jiu-JitsuBlack belt in JudoBlack belt in TaekwondoYellow rope in Capoeira |
years active | 1997 – present (MMA) |
box win | 1 |
box kowin | 1 |
box loss | 1 |
box koloss | 1 |
mma win | 31 |
mma kowin | 18 |
mma subwin | 6 |
mma decwin | 7 |
mma loss | 4 |
mma subloss | 2 |
mma decloss | 1 |
mma dqloss | 1 |
children | 5 |
url | http://www.spidersilva.com/ |
boxrec | 152826 |
sherdog | 1356 |
updated | February 5, 2011 }} |
Anderson da Silva (; born April 14, 1975) is a Brazilian mixed martial artist. He is the current UFC Middleweight Champion and the promotion's longest reigning champion. With 14 consecutive wins, Silva holds the longest active winning streak in the UFC and the record for the longest winning streak in UFC history. In a press conference for UFC 134, UFC president Dana White proclaimed Silva as the greatest fighter in the history of mixed martial arts.
Silva is ranked as the number one Middleweight in the world by multiple publications; he is also the consensus #1 pound-for-pound fighter in the world according to multiple publications. Silva is also the last Cage Rage Middleweight Champion and a former Shooto Middleweight Champion. Besides the UFC and Cage Rage, Silva has fought for a number of other MMA promotions including the Pride Fighting Championships, Shooto and Rumble on the Rock.
Once a member of the Chute Boxe Academy, Silva left to form the Muay Thai Dream Team. In late November 2006, he joined new team Black House with Lyoto Machida, Vitor Belfort, Assuerio Silva, and the Nogueira brothers. On May 16, 2008 Silva and Antonio Rodrigo Nogueira opened the Team Nogueira MMA Academy in Miami, Florida.
At ''Pride 26'', Silva faced Daiju Takase. Considering his record at the time – with only four wins to seven losses – Takase was a big underdog. Surprisingly, after dominating most of the fight with takedowns, top position, and effective ground and pound, Takase submitted Silva with a triangle choke late in the first round.
After his loss to Takase, Silva fought in other promotions around the world. On June 27, 2004, Silva fought Jeremy Horn and earned a decision victory.
Although he was slated to fight Matt Lindland at ''Cage Rage 16'', Lindland's decision to fight Mike Van Arsdale at ''Raze Fight Night'' put an end to the highly-anticipated match up. Instead, Silva defended his championship against Tony Fryklund, winning the fight with a reverse elbow, knocking out Fryklund early in the first round.
Silva fought Franklin at ''UFC 64'' on October 14, 2006, and defeated him by TKO (strikes) at 2:59 in the first round. Silva hit Franklin with knees to the body from the Muay Thai-clinch, then badly broke Franklin's nose with a knee to the face. Unable to strike back, Franklin dodged the last of Silva's strikes before falling to the ground, where referee "Big" John McCarthy ended the fight. Silva was then crowned the new UFC Middleweight Champion, becoming the second man to defeat Franklin, after Black House-teammate Lyoto Machida.
After his fight with Côté, Silva was criticized for seemingly avoiding contact during the bout. Dana White criticized Silva, saying: "I didn't understand Silva's tactics... It wasn't the Anderson Silva I've been watching the last two years." Silva said in the post-fight news conference:
"There are many people saying I was disrespecting Cote, but this is absolutely not true. My game plan since the beginning was fight five rounds, inducing him to commit mistakes and capitalize on that during the first three rounds and look for the knockout during the fourth and fifth rounds. It was working, and the biggest proof of that is that I almost didn’t waste any blows. I connected with a couple of good punches and knees, but unfortunately he got hurt and the fight was over. This is not my fault."
After defeating Griffin, a Yahoo! Sports reporter allegedly claimed that Silva's manager, Ed Soares, had confirmed that Silva would abandon his Middleweight belt to fight at Light Heavyweight. However, Soares and a UFC spokesperson confirmed that a conversation agreeing Silva would permanently move up to Light Heavyweight never took place. Silva did not relinquish his title to fight exclusively at Light Heavyweight. Soares stated his attorney plans to speak to Yahoo! Sports about the matter.
In the first two rounds Silva appeared to mock his opponent while employing quick, precise striking. In the third round, however, Silva's tempo seemed to change. He looked to Maia to be the aggressor while he largely circled and taunted his opponent. In the fifth round, Silva's lack of action prompted referee Dan Miragliotta to warn Silva for his conduct. The crowd began to side with Maia, who was the only fighter attempting to engage. After 5 rounds, Silva was declared the winner via unanimous decision.
Silva was widely criticized for his performance. Dana White said it was the most embarrassed he had ever been since becoming UFC president. Midway through the fourth round, White walked away from the fight and gave the championship belt to Silva's manager, Ed Soares. White was so annoyed that he declined to personally place the belt around Silva's waist, claiming it was the first time he had done so after a title match. It was also claimed that Silva verbally insulted Maia multiple times during the fight.
In the immediate post-fight interview, Silva apologized and said he did not know what got into him and said he should have been more humble. However, in the official post-fight press conference, he said he "owed nobody an apology" and that "he couldn't please everyone". He also made multiple references about how Demian insulted him. In the same conference, Dana White apologized to the fans that "bought this [stuff]", and said he would make it up to them.
On August 7, 2010, Silva faced Chael Sonnen for the UFC Middleweight Title at UFC 117. In the first round, Sonnen stunned Silva with a punch before taking him down and dominating from the top position, landing multiple blows. The following three rounds played out in a similar fashion, going to the ground early with Sonnen dominating from inside Silva's guard. In the fifth round, Silva slipped while ducking under Sonnen's left hook and the challenger took advantage by once again establishing a top position and delivering strikes to Silva. With about two minutes left in the round, Silva was able to lock up a triangle armbar on Sonnen, forcing Sonnen to submit at 3:10 of Round 5.
Silva was hit more in the fight than in his entire career. According to CompuStrike, in his first 11 UFC fights, Silva was hit 208 times. Sonnen hit him a total of 289 times. After the bout it was revealed that Sonnen would have won a judges' decision. All three judges had Sonnen marked as the winner of all four rounds, judges Nelson Hamilton and Dan Stell had Sonnen taking Round 1 10–8, as well as Hamilton awarding the challenger another 10–8 total in Round 3.
Silva allegedly went into the fight with injured ribs and his doctor advised him not to fight. During the first round, he cracked his rib and was out until 2011 because of the injury. Following the fight the California State Athletic Commission confirmed that Chael Sonnen tested positive for performance-enhancing drugs (PED's). Doping tests revealed Sonnen had an elevated testosterone level which fell outside of the normal range prior to his fight with Silva. Dana White had announced that Sonnen would get a rematch when Silva returns, but this was revoked after the issue with PEDs came to light.
In an interview with Brazilian TV station SporTV in September 2008, Silva stated that he was interested in retiring within the next year. However, Anderson's manager, Ed Soares and co-manager Nicholas Gansen, responded to the talk of retirement by saying that Anderson was contractually obligated to fight six more fights (his sixth was against Vitor Belfort) and would do so before retiring. Soares further stated that Silva desires to retire when he is 35 which he turned on April 14, 2010. According to Anderson Silva's manager, Ed Soares, he is not retiring after his contract is over in 2010 and what he supposedly wants is to stay in the 185 division.
Silva is Afro-Brazilian and has three sons and two daughters with his wife. Silva appeared in ''Never Surrender'' in 2009.
Result | Record | Opponent | Method | Date | Round | Time | Location | Notes |
align="center" xWin | Julio Cesar De Jesus | KO | Ginasio Antonio Balbino, Salvador, Bahia, Brazil | |||||
align="center" xLoss | Osmar Luiz Teixeira | TKO | Uniao da Vitoria, Parana, Brazil |
This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.