EFFECTIVE
DISTILLATION
IS THE KEY
WHEN AN ATTACK
TAKES PLACE:

Hundreds of millions of
data points pour into
a DDoS mitiga...
Upcoming SlideShare
Loading in …5
×

Fingerprinting a DDoS Attack

443 views
282 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
443
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Fingerprinting a DDoS Attack

  1. 1. EFFECTIVE DISTILLATION IS THE KEY WHEN AN ATTACK TAKES PLACE: Hundreds of millions of data points pour into a DDoS mitigation platform in real-time ?? ??? ? ?? ? ? ? ? Analyze data to detect anomalies and malicious traffic Use automated rules and human attack mitigation techniques to allow good traffic through and block bad traffic The Goal: 101101010001010100011 010100110101001110011 101010011010101001100 101010100110010100101 101010010101010100101 010100101010011100010 101010100101001110101 Store billions of traffic and attack data metrics in the cloud • Make all incoming attack data useful to humans Typical Automated Method RAW DATA AUTO ANALYSIS OUTCOME: Ineffective distillation Leads to murky results and an unclear fingerprint Prolexic Human Mitigation Method RAW DATA AUTO ANALYSIS The Problem: • There is a gap between what automated data analytics can do and what malicious attackers can do live behind their botnets • Automatic decision making equipment is prone to false positives Conclusion: • That’s why we need human DDoS mitigators COMPARE THESE 2 METHODS HUMAN MITIGATION (THE MISSING INGREDIENT) OUTCOME: Potent distillation This crucial extra step leads to clear and effective results with a highly identifiable fingerprint CHEERS!

×