Methods of reducing impact from distributed denial-of-service attacks
DDoS mitigation is a set of network management techniques and/or tools, for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet, by protecting the target, and relay networks. DDoS attacks are a constant threat to businesses and organizations, by delaying service performance, or by shutting down a website entirely.[1] It's also important to remember that mitigation won't work on code based softwares.
DDoS mitigation works by identifying baseline conditions for network traffic by analyzing "traffic patterns", to allow threat detection and alerting.[2] DDoS mitigation also requires identifying incoming traffic, to separate human traffic from human-like bots and hijacked web browsers. This process involves comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and browser fingerprints.
After the detection is made, the next process is filtering. Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting.[3][4]
One technique is to pass network traffic addressed to a potential target network through high-capacity networks, with "traffic scrubbing" filters.[2]
Manual DDoS mitigation is no longer recommended, due to the size of attacks often outstripping the human resources available in many firms/organizations.[5] Other methods to prevent DDoS attacks can be implemented, such as on-premises and/or cloud-based solution providers. On-premises mitigation technology (most commonly a hardware device) is often placed in front of the network. This would limit the maximum bandwidth available to what is provided by the Internet service provider.[6] Common methods involve hybrid solutions, by combining on-premises filtering with cloud-based solutions.[7]
^Gaffan, Marc (20 December 2012). "The 5 Essentials of DDoS Mitigation". Wired.com. Retrieved 25 March 2014.
^ abPaganini, Pierluigi (10 June 2013). "Choosing a DDoS mitigation solution…the cloud based approach". Cyber Defense Magazine. Retrieved 25 March 2014.
^Geere, Duncan (27 April 2012). "How deep packet inspection works". Wired.com. Retrieved 12 June 2018.
^Patterson, Dan (9 March 2017). "Deep packet inspection: The smart person's guide". Techrepublic.com. Retrieved 12 June 2018.
^Tan, Francis (2 May 2011). "DDoS attacks: Prevention and Mitigation". The Next Web. Retrieved 25 March 2014.
^Leach, Sean (17 September 2013). "Four ways to defend against DDoS attacks". Networkworld.com. Archived from the original on 12 June 2018. Retrieved 12 June 2018.
^Schmitt, Robin (2 September 2017). "Choosing the right DDoS solution". Enterpriseinnovation.net. Archived from the original on 12 June 2018. Retrieved 12 June 2018.
DDoSmitigation is a set of network management techniques and/or tools, for resisting or mitigating the impact of distributed denial-of-service (DDoS)...
monitoring and mitigation services were provided by a 24/7 security operations control center (SOCC). Prolexic indicated its DDoSmitigation services make...
company that provides content delivery network (CDN), cybersecurity, DDoSmitigation, and cloud services. Headquartered in Cambridge, Massachusetts, it...
platform, DDoSmitigation, colocation center, custom software development, game testing, function as a service (FaaS) and logging as a Service (LaaS). A January...
global content delivery network to provide web application security, DDoSmitigation, content caching, application delivery, load balancing and failover...
Network Intelligence and Availability (NIA) Services, which encompasses DDoSmitigation, managed DNS and threat intelligence. On August 9, 2010, Symantec completed...
and the Spanish National Police. Spamhaus also hired Cloudflare, a DDoSmitigation company, to assist them by distributing their internet services across...
and Anti DDoS Vendor of the Year at Frost & Sullivan's 2019 India ICT Awards and was positioned as a leader in IDC MarketScape for Global DDoS Prevention...
York Times. 16 June 2014. Retrieved 16 June 2014. "Level 3 Acquires DDoSMitigation Company Black Lotus". Level 3 Communications. Retrieved 12 July 2015...
cloud security services include denial-of-service attack protection, bot mitigation, and a web application firewall. Fastly's web application firewall uses...
The application security software includes Web Application Firewall (WAF), DDoS Protection, Runtime Application Self-Protection (RASP), API Security, bot...
investigation of the Mirai botnet and DDoS attacks. In the course of that investigation, they discovered that DDoSmitigation firm BackConnect was engaging in...
BlockDos was a reseller of mitigation technology to other providers. Beginning in 2008, BlockDos sold its own DDoSmitigation. The company has offices in...
Presence (PoPs) on five continents. Services include CDN, video acceleration, DDoS protection, cloud storage, cloud access security broker (CASB), web application...
compression, a non-commercial WAF (Web Application Firewall) and up to 20 Mbit/s throughput. Kemp announced and launched the world's first software-defined...
the slogan in the 1980s. In 2019, the content delivery network and DDoSmitigation company Cloudflare took the rights of the slogan by registering it...