DDoS mitigation

DDoS protectionmitigationAnti-DDoSanti-DoS software
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.wikipedia
34 Related Articles

Denial-of-service attack

DDoSdenial of servicedistributed denial of service
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.
An advanced persistent DoS (APDoS) is associated with an advanced persistent threat and requires specialised DDoS mitigation.

Internet

onlinethe Internetweb
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.

Internet bot

botbotsinternet bots
DDoS mitigation also requires identifying incoming traffic to separate human traffic from human-like bots and hijacked web browsers.

IP address

IP addressesIPdynamic IP address
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and JavaScript footprints.

HTTP cookie

cookiescookieHTTP cookies
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and JavaScript footprints.

List of HTTP header fields

HTTP headerHTTP headersheader
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and JavaScript footprints.

JavaScript

Server-side JavaScriptclient-side JavaScriptJS
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and JavaScript footprints.

Deep packet inspection

Deep Packet Inspection (DPI)DPIComplete Packet Inspection
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting.

Whitelisting

whitelistwhite listapplication whitelisting
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting.

Rate limiting

rate-limitingrate limitersrate-limit
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting.

Cloud computing

cloudcloud-basedcloud services
Other ways to prevent DDoS attacks can be implemented on-premise or/and via cloud-based solution providers.

Internet hosting service

hostinghosting servicesInternet hosting
A number of vendors are offering "DDoS resistant" hosting services, mostly based on techniques similar to content delivery networks.

Content delivery network

CDNcontent distribution networkedge server
A number of vendors are offering "DDoS resistant" hosting services, mostly based on techniques similar to content delivery networks.

IP address spoofing

IP spoofingspoofedspoofing
One technique of DDoS attacks is to use misconfigured third-party networks that allow amplification of spoofed UDP packets.

User Datagram Protocol

UDPUDP/IPUDP protocol
One technique of DDoS attacks is to use misconfigured third-party networks that allow amplification of spoofed UDP packets.

Ingress filtering

filter users by IP addressBCP 38ingress
Proper configuration of network equipment, enabling ingress filtering and egress filtering, as documented in BCP 38 and RFC 6959, prevents amplification and spoofing, thus reducing the number of relay networks available to attackers.

Egress filtering

egress
Proper configuration of network equipment, enabling ingress filtering and egress filtering, as documented in BCP 38 and RFC 6959, prevents amplification and spoofing, thus reducing the number of relay networks available to attackers.

Cloudflare

CloudFlare protectionCloudFlare’s
Cloudflare, Inc. is an American web infrastructure and website security company, providing content delivery network services, DDoS mitigation, Internet security, and distributed domain name server services.

CDNetworks

Services include CDN, video acceleration, DDoS protection, cloud storage, cloud access security broker (CASB), web application firewall (WAF) and managed DNS with cloud load balancing.

Incapsula

Imperva Incapsula CDN
It uses a global content delivery network to provide web application security, DDoS mitigation, content caching, application delivery, load balancing and failover services.

Alibaba Cloud

AlibabaAlibaba Cloud ECSAlibaba Cloud Express
Services are available on a pay-as-you-go basis and include Elastic Compute, Data Storage, Relational Databases, Big-Data Processing, Anti-DDoS protection and Content Delivery Networks (CDN).