Man, Machine and DDoS Mitigation
The Case for Human Cyber Security Expertise
Selected excerpts
Prolexic recently released ...
of an application server infrastructure. Even simple application attacks can critically overload web
servers and databases...
Upcoming SlideShare
Loading in...5
×

Man, Machine and DDoS Mitigation: A Case for Human Cyber Security Expertise

62

Published on

http://www.prolexic.com/services-dos-and-ddos-mitigation.html | Can automated DDoS mitigation appliances alone stop today’s large, brute force DDoS attacks from bringing down your website? The answer is no. Attackers can overwhelm and sidestep static devices in several ways. In Prolexic’s experience, all the tools available today to fight against DDoS attacks are missing the most important part of the solution – the experience of an expert security engineer. In this excerpt from their DDoS protection planning white paper, Prolexic explains why you need human security expertise in today’s threat landscape.

Published in: Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
62
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Man, Machine and DDoS Mitigation: A Case for Human Cyber Security Expertise

  1. 1. Man, Machine and DDoS Mitigation The Case for Human Cyber Security Expertise Selected excerpts Prolexic recently released a white paper that explains why experienced security professionals analyzing network traffic in real time stop distributed denial of service (DDoS) attacks faster than pre-programmed and automated mitigation equipment – and at far less risk to an organization’s bottom line. DDoS mitigation appliances are network devices used by IT departments that are intended to prevent an outage caused by a DDoS attack. But today’s DDoS attacks are often large and complex – too large and complex for automated DDoS mitigation. As a result, Prolexic has found that realtime monitoring and analysis of network traffic by experienced DDoS mitigation engineers during an attack is the only approach that ensures effective DDoS mitigation, especially when live attackers change attacks throughout an event. A DDoS attack is an attempt to make a computer resource (i.e. website, e-mail, voice, or a network) unavailable to its intended users. By overwhelming it with data, requests or both, the target system either responds so slowly as to be unusable or crashes completely. The data volumes required to do this are typically achieved when attackers harness a network of remotely controlled zombie or botnet (robot network) computers. These compromised computers have fallen under the control of an attacker, generally through the use of a Trojan virus or other malware. Outages caused by DDoS attacks are increasing in frequency, size and volume and are damaging to businesses. As a result, many organizations have made big investments in automated defensive tools such as firewalls, intrusion prevention systems (IPS), intrusion detection systems (IDS), and router appliances. Unfortunately, automated tools often fail to block a DDoS attack. Growing attack size and complexity Typically, a local DDoS mitigation appliance can handle less than 10 gigabits per second (Gbps) of attack traffic, while a firewall solution offered by an ISP can usually handle less than 20 Gbps. A typical solution from a cloud-hosting provider can handle less than 40 Gbps. Yet, many of today’s DDoS attacks are bigger than that. For example, in 2013, Prolexic blocked multiple attacks that peaked at more than 100 Gbps, with the company largest measuring the largest at 179 Gbps. DDoS attacks also continue to increase in complexity. DDoS attackers target the network layer, described in the Open Systems Interconnection model (OSI model) as Layer 3, the transport layer (Layer 4) and the application layer (Layer 7) – and often all three in the same campaign. Attackers create Layer 7 attacks that resemble legitimate traffic as a strategy to overload specific elements
  2. 2. of an application server infrastructure. Even simple application attacks can critically overload web servers and databases. Although many company executives may think it is unlikely their organization will be attacked, all companies and industry sectors are vulnerable. Today’s attackers are using more powerful DDoS toolkits such as the itsoknoproblembro toolkit to take advantage of vulnerabilities in web servers. The financial damage from DDoS attacks is growing. Gartner predicts a 10 percent growth in the financial impact that cybercrime will have on online businesses through 2016, as DDoS attackers take advantage of new software vulnerabilities that are introduced via new cloud services and employee-owned devices used in the workplace.1 As a result, enterprises are at a higher risk of financial losses and damage to their global business reputation than ever before. Get the full white paper for more details Download the white paper, Man, Machine and DDoS Mitigation, which explains why you need human cyber security expertise: ● Understand the current and future DDoS threatscape ● Learn the capabilities and limitations of specific types of DDoS mitigation appliances ● Find out how live attackers overwhelm automated systems ● Understand the weaknesses of the new breed of intelligent DDoS mitigation device ● Avoid blocking legitimate traffic when under attack ● Learn about Prolexic’s Security Operations Center The more you know about DDoS attacks, the better you can protect your network against cybercrime. Download the free DDoS protection white paper today. About Prolexic Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. Learn more at http://www.prolexic.com. 1 “Gartner Reveals Top Predictions for IT Organizations and Users for 2012 and Beyond,” December 1, 2011

×