Академический Документы
Профессиональный Документы
Культура Документы
Step 5
Step 6
Step 8 Step 7 Wait for
Attack
Delete Wait 6 Pressure
Auxillary
Footprint minutes Change
Valves
(2 hours)
DDoS – Distributed Denial of Service
• The target server alone is brought down while the larger internet is
unaffected (except for the increased network bandwidth)
• Reason for the attack stems from personal (disgruntled employee) to
political.
• At different points in time many leading organizations have been
impacted – amazon, yahoo, ebay, …
Modus operandi of DDoS
How to mitigate / handle DDoS?
• Cannot be eliminated because source cannot be found till the attack happens.
• It takes a multi-level protection strategy to prevent DDoS attack from harming the
system.
• Defense mechanisms includes combination of firewalls, VPN, anti-spam, content filtering, load
balancing
• Have a well planned response team to handle DDoS attack. Some of the early warnings of DDoS
attack include network slowdown, spotty connectivity, intermittent website shutdown
• Systems check list – filtering tools including h/w, s/w level protection should always be ready.
• Strong Network architecture is very important. For example, a geographically distributed servers will
have two advantages:
• When one server is attacked, other servers can continue to be active
• Difficult for hackers to target distributed servers at the same time
• Consider using cloud especially for MSME that cannot afford big budget for network security.
• Major cloud service providers are better equipped to handle these attacks
• Consider using DDoS-as-a-service. It includes combination of in-house and third-party server hosting