DDoS Boot Camp
Upcoming SlideShare
Loading in...5

DDoS Boot Camp






Total Views
Views on SlideShare
Embed Views



7 Embeds 1,511

http://www.prolexic.com 1392
http://ec2-54-215-168-61.us-west-1.compute.amazonaws.com 49 26
http://lweb1.dev.plx 24 15
https://www.google.com.eg 3
http://lreplicator1.mia2.plx 2


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    DDoS Boot Camp DDoS Boot Camp Presentation Transcript

    • DDoS Boot Camp: Basic Training for an Increasing Cyber Threat www.prolexic.com
    • www.prolexic.com DDoS Attacks Are Launched by Criminals, Not Teenagers • Data breaches and denial of service are criminal-led, malicious acts • Distributed denial of service (DDoS) attacks are the most common and destructive form of online hacking • Organized cyber-attack groups launch politically-motivated attacks to cause website downtime 2 May 2013 www.prolexic.com
    • www.prolexic.com Estimating the Cost of a DDoS Attack • Financial services companies lost an estimated US $17 million per DDoS attack in 2012, per Forrester Consulting 3
    • www.prolexic.com What Is a DDoS Denial of Service Attack? • Attempt to make a computer resource unavailable to its intended users • Targeted systems include: – Websites – Email systems – VOIP (phone systems) – Network as a whole • Hackers control remote botnets (robot networks) of virus- infected computers • It is difficult to identify the perpetrator • Hacker techniques can further amplify the attack to multiply the power of huge botnet 4
    • www.prolexic.com DDoS Attack Types 5 • Not all attacks are the same • Different techniques target different network elements • For example: – Layer 3 and Layer 4 attacks target the network infrastructure with huge volumes of traffic – Layer 7 attacks target web applications. These stealthy attacks resemble legitimate traffic to overload the server
    • www.prolexic.com Where Do DDoS Attacks Come From? • Worldwide problem • Almost every country is a source of DDoS attacks • Many DDoS attacks originate from: – Compromised servers at hosting providers that don’t clean up malware – Servers out of reach of international authorities • China is the leading source of botnet activity • The United States is the second leading source 6
    • www.prolexic.com Why Do DDoS Attackers Strike? • Hacktivisim and ideological and political differences • Extortion and other financial motivation • Competitive attacks and hate crimes by disgruntled employees or unhappy customers • Hacker experimentation – novices trying to make a name for themselves • Download the white paper for more details 7
    • www.prolexic.com DDoS Attackers Target Many Industries • e-Commerce • Education • Energy • Finance, banking and insurance • Government and defense • Healthcare • Internet and telecom • Media and entertainment • Non-profits • Retail • Technology • Travel 8
    • www.prolexic.com Download the Free White Paper • Download the white paper DDoS Boot Camp: Basic Training for an Increasing Cyber Threat at http://www.prolexic.com/bootcamp. • The white paper includes: – What is DDoS – Types of DDoS attacks and their relative popularity – Insight into hacker mindsets and motives – How different attacks target specific network weaknesses – DDoS mitigation best practices for incident response and business continuity – A case study of successful DDoS attack readiness 9
    • www.prolexic.com About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. • Prolexic has successfully stopped DDoS attacks for more than a decade. • We can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers. 10