DDoS mitigationwikipedia
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.
DDoS protectionanti-DoS softwaremitigation

Denial-of-service attack

denial-of-service attackdenial of servicedistributed denial of service
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.
APDoS attacks represent a clear and emerging threat needing specialised monitoring and incident response services and the defensive capabilities of specialised DDoS mitigation service providers.

Cloudflare

CloudflareCloudFlare’sCloudFlare protection
Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services such as Arbor Networks, Incapsula, Allot, Akamai, CloudFlare or Radware.
Cloudflare, Inc. is a U.S. company that provides content delivery network services, DDoS mitigation, Internet security and distributed domain name server services, sitting between the visitor and the Cloudflare user's hosting provider, acting as a reverse proxy for websites.

CDNetworks

Services include CDN, video acceleration, DDoS protection, cloud storage, cloud access security broker (CASB), web application firewall (WAF) and managed DNS with cloud load balancing.

Flowmon Networks

Its Flowmon product series consists of network monitoring probes, collectors for flow data (NetFlow, IPFIX and other standards) analysis and software modules which extend probes and collectors by analytical features for network behavior anomaly detection, network awareness application performance management, DDoS detection and mitigation and traffic recording.

Mirai (malware)

MiraiMirai malware
The reason for the use of the large number of IoT devices is to bypass some anti-DoS software which monitors the IP address of incoming requests and filters or sets up a block if it identifies an abnormal traffic pattern, for example, if too many requests come from a particular IP address.

Distributed denial-of-service attacks on root nameservers

under attackDNS attacksmassive attack
Nevertheless, DDoS attacks on the root zone are taken seriously as a risk by the operators of the root nameservers, and they continue to upgrade the capacity and DDoS mitigation capabilities of their infrastructure to resist any future attacks.

High Orbit Ion Cannon

HOIC
DDoS mitigation usually works on the principle of distribution, which is basically intelligent routing of traffic to avoid congestion and prevent overload at a single URL.

BlackVPN

blackVPN
On April 25, DDoS mitigation provider Cloudflare called out the threats as fake,

Prolexic Technologies

The cloud-based DDoS mitigation approach used by Prolexic employs technology to redirect traffic to the company’s DDoS mitigation service, scrub the traffic, and send only legitimate traffic to the client site.

Incel

incelinceldomincels
Cloudflare, which provides services including DDoS protection and caching so that webpages are still accessible when a site is offline, has also been criticized for protecting incel websites against downtime even when webhosts have terminated service.

Internet

internetonlinethe Internet
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.

Internet bot

botbotsinternet bot
DDoS mitigation also requires identifying incoming traffic to separate human traffic from human-like bots and hijacked web browsers.

IP address

IPIP addressesIP Address
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

HTTP cookie

cookiescookiepersistent cookie
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

List of HTTP header fields

HTTP headerHTTP headersheader
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

JavaScript

javascriptJSclient-side JavaScript
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

Deep packet inspection

deep packet inspectionDeep Packet Inspection (DPI)DPI
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, rate limiting.

Whitelisting

whitelistwhitelistingwhite list
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, rate limiting.

Rate limiting

rate limitingrate-limitingrate limiters
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, rate limiting.

Cloud computing

cloud computingcloudcloud-based
Other ways to prevent DDoS attacks can be implemented on-premise or/and via cloud-based solution providers.