Protecting Your Business from DDoS Attacks How effect to DOS attach to the company – what are the DOS attacks, how it effect to the company, how to overcome this problem etc. Saptha Wanniarachchi MBCS,MCSE<MCITP
How it works A botnet is a network of computers that have been infected and can be used remotely by hackers in order to carry out various attacks. Botnets: nearly 1/4 of all computers have them. They use your computer to send spam, collect personal information, or take down websites, all without your knowledge
Application - exploit some feature of a specific application on victim host - disables legitimate client use of that application and possibly strains resources - indistinguishable from legitimate packets - semantics of application must be heavily used in detection
Host - disable access to the target machine completely by overloading or disabling its communication mechanism (ex: TCP SYN attack) - attack packets carry real destination address of target host
Network Attacks - consume incoming bandwidth of a target networks - attack packets have destination addresses within address space of network - high volume makes detection easy
Infrastructure - target some distributed service that is crucial for the global Internet operation or operation of a sub-network - ex: DNS server attacks
Estimates from Forrester, IDC, and the Yankee Group predict the cost of a 24-hour outage for a large e-commerce company would approach US$30 million.
Ensure that you have adequate bandwidth on your Internet connection. You'll be able to foil many low-scale DDoS attacks by simply having enough bandwidth (and processing power) to service the requests.
Deploy DDoS Mitigation Plan
Hire Experts , draft and implement plan to mitigate the risk of been attacked