DDoS Boot Camp
Upcoming SlideShare
Loading in...5
×
 

DDoS Boot Camp

on

  • 2,026 views

 

Statistics

Views

Total Views
2,026
Views on SlideShare
515
Embed Views
1,511

Actions

Likes
0
Downloads
14
Comments
0

7 Embeds 1,511

http://www.prolexic.com 1392
http://ec2-54-215-168-61.us-west-1.compute.amazonaws.com 49
http://54.193.33.120 26
http://lweb1.dev.plx 24
http://117.58.246.154 15
https://www.google.com.eg 3
http://lreplicator1.mia2.plx 2
More...

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    DDoS Boot Camp DDoS Boot Camp Presentation Transcript

    • DDoS Boot Camp: Basic Training for an Increasing Cyber Threat www.prolexic.com
    • www.prolexic.com DDoS Attacks Are Launched by Criminals, Not Teenagers • Data breaches and denial of service are criminal-led, malicious acts • Distributed denial of service (DDoS) attacks are the most common and destructive form of online hacking • Organized cyber-attack groups launch politically-motivated attacks to cause website downtime 2 May 2013 www.prolexic.com
    • www.prolexic.com Estimating the Cost of a DDoS Attack • Financial services companies lost an estimated US $17 million per DDoS attack in 2012, per Forrester Consulting 3
    • www.prolexic.com What Is a DDoS Denial of Service Attack? • Attempt to make a computer resource unavailable to its intended users • Targeted systems include: – Websites – Email systems – VOIP (phone systems) – Network as a whole • Hackers control remote botnets (robot networks) of virus- infected computers • It is difficult to identify the perpetrator • Hacker techniques can further amplify the attack to multiply the power of huge botnet 4
    • www.prolexic.com DDoS Attack Types 5 • Not all attacks are the same • Different techniques target different network elements • For example: – Layer 3 and Layer 4 attacks target the network infrastructure with huge volumes of traffic – Layer 7 attacks target web applications. These stealthy attacks resemble legitimate traffic to overload the server
    • www.prolexic.com Where Do DDoS Attacks Come From? • Worldwide problem • Almost every country is a source of DDoS attacks • Many DDoS attacks originate from: – Compromised servers at hosting providers that don’t clean up malware – Servers out of reach of international authorities • China is the leading source of botnet activity • The United States is the second leading source 6
    • www.prolexic.com Why Do DDoS Attackers Strike? • Hacktivisim and ideological and political differences • Extortion and other financial motivation • Competitive attacks and hate crimes by disgruntled employees or unhappy customers • Hacker experimentation – novices trying to make a name for themselves • Download the white paper for more details 7
    • www.prolexic.com DDoS Attackers Target Many Industries • e-Commerce • Education • Energy • Finance, banking and insurance • Government and defense • Healthcare • Internet and telecom • Media and entertainment • Non-profits • Retail • Technology • Travel 8
    • www.prolexic.com Download the Free White Paper • Download the white paper DDoS Boot Camp: Basic Training for an Increasing Cyber Threat at http://www.prolexic.com/bootcamp. • The white paper includes: – What is DDoS – Types of DDoS attacks and their relative popularity – Insight into hacker mindsets and motives – How different attacks target specific network weaknesses – DDoS mitigation best practices for incident response and business continuity – A case study of successful DDoS attack readiness 9
    • www.prolexic.com About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. • Prolexic has successfully stopped DDoS attacks for more than a decade. • We can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers. 10