Wednesday, March 4, 2020

Questions for Selecting a DDoS

The sophistication, size, and frequency of Distributed Denial of Service (DDoS) attacks continue to increase—with no apparent end in sight. Where 2 Gbps attacks were once the norm, organizations are now routinely taking steps to mitigate 200+ Gbps attacks against not only the network (Layer 3 and Layer 4), but the applications (Layer 7).

Before we examine prevention and mitigation to DDoS attacks, it is important to reach a common definition of a DDoS attack, which is based on my own experience in the field:

A DDoS attack is an attack intended to take an organization or a service offline, or otherwise render resources unusable, which originates from (or appears to originate from) multiple hosts. The "multiple hosts" part of the attack is what makes it "distributed," and is what makes the attack more difficult to defend against. An attack that originates from a single host or IP address can be easily blocked with a simple router access list or firewall rule.

SYN/UTP/TCP flood attacks, DNS Amplification, NTP Reflection/Amplification, SQL injection, and native SSL attacks have become topics of conversation well outside IT and infrastructure organizations.

As these threats continue to permeate mainstream business conversations, we’ve identified five key questions to ask your organization and your service provider about their DDoS mitigation strategy.

More Info: what does ddos mean

No comments:

Post a Comment