DDoS mitigation

DDoS protectionAnti-DDoSanti-DoS softwaremitigation
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.wikipedia
38 Related Articles

Cloudflare

CloudFlare protectionCloudFlare’s
Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services such as Arbor Networks, Incapsula, Allot, Akamai, CloudFlare or Radware.
Cloudflare, Inc. is a U.S. company that provides content delivery network services, DDoS mitigation, Internet security and distributed domain name server services.

Denial-of-service attack

denial of servicedistributed denial of serviceDDoS
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.
APDoS attacks represent a clear and emerging threat needing specialised monitoring and incident response services and the defensive capabilities of specialised DDoS mitigation service providers.

Internet

onlinethe Internetweb
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.

Internet bot

botbotsinternet bots
DDoS mitigation also requires identifying incoming traffic to separate human traffic from human-like bots and hijacked web browsers.

IP address

IPIP addressesaddress
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

HTTP cookie

cookiescookiepersistent cookie
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

List of HTTP header fields

HTTP headerHTTP headersheader
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

JavaScript

JSclient-side JavaScriptserver-side JavaScript
The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and Javascript footprints.

Deep packet inspection

Deep Packet Inspection (DPI)DPIdeep packet insertion
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, rate limiting.

Whitelisting

whitelistwhite listapplication whitelisting
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, rate limiting.

Rate limiting

rate-limitingrate limitersrate-limit
Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, rate limiting.

Cloud computing

cloudcloud-basedcloud services
Other ways to prevent DDoS attacks can be implemented on-premise or/and via cloud-based solution providers.

Arbor Networks

Arbor
Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services such as Arbor Networks, Incapsula, Allot, Akamai, CloudFlare or Radware.

Incapsula

Imperva Incapsula CDN
Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services such as Arbor Networks, Incapsula, Allot, Akamai, CloudFlare or Radware.

Allot

Allot Communications Ltd.
Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services such as Arbor Networks, Incapsula, Allot, Akamai, CloudFlare or Radware.

Akamai Technologies

AkamaiAkamai Technologies Inc.Israeli multinational server arrays as the backbone of Facebook's data porting
Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services such as Arbor Networks, Incapsula, Allot, Akamai, CloudFlare or Radware.

Radware

Radware Ltd.
Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services such as Arbor Networks, Incapsula, Allot, Akamai, CloudFlare or Radware.

Internet hosting service

hostinghosting serviceshosted
A number of vendors are offering "DDoS resistant" hosting services, mostly based on techniques similar to content delivery networks.

Content delivery network

CDNcontent distribution networkContent Delivery Networks
A number of vendors are offering "DDoS resistant" hosting services, mostly based on techniques similar to content delivery networks.

IP address spoofing

spoofedspoofingIP address
One technique of DDoS attacks is to use misconfigured third-party networks that allow amplification of spoofed UDP packets.

User Datagram Protocol

UDPUDP/IPUDP protocol
One technique of DDoS attacks is to use misconfigured third-party networks that allow amplification of spoofed UDP packets.

Ingress filtering

filter users by IP addressingressnetwork ingress filtering
Proper configuration of network equipment, enabling ingress filtering and egress filtering, as documented in BCP 38 and RFC 6959, prevents amplification and spoofing, thus reducing the number of relay networks available to attackers.

Egress filtering

egress
Proper configuration of network equipment, enabling ingress filtering and egress filtering, as documented in BCP 38 and RFC 6959, prevents amplification and spoofing, thus reducing the number of relay networks available to attackers.