DDoS Boot Camp

3,998 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
3,998
On SlideShare
0
From Embeds
0
Number of Embeds
3,098
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DDoS Boot Camp

  1. 1. DDoS Boot Camp: Basic Training for an Increasing Cyber Threat www.prolexic.com
  2. 2. www.prolexic.com DDoS Attacks Are Launched by Criminals, Not Teenagers • Data breaches and denial of service are criminal-led, malicious acts • Distributed denial of service (DDoS) attacks are the most common and destructive form of online hacking • Organized cyber-attack groups launch politically-motivated attacks to cause website downtime 2 May 2013 www.prolexic.com
  3. 3. www.prolexic.com Estimating the Cost of a DDoS Attack • Financial services companies lost an estimated US $17 million per DDoS attack in 2012, per Forrester Consulting 3
  4. 4. www.prolexic.com What Is a DDoS Denial of Service Attack? • Attempt to make a computer resource unavailable to its intended users • Targeted systems include: – Websites – Email systems – VOIP (phone systems) – Network as a whole • Hackers control remote botnets (robot networks) of virus- infected computers • It is difficult to identify the perpetrator • Hacker techniques can further amplify the attack to multiply the power of huge botnet 4
  5. 5. www.prolexic.com DDoS Attack Types 5 • Not all attacks are the same • Different techniques target different network elements • For example: – Layer 3 and Layer 4 attacks target the network infrastructure with huge volumes of traffic – Layer 7 attacks target web applications. These stealthy attacks resemble legitimate traffic to overload the server
  6. 6. www.prolexic.com Where Do DDoS Attacks Come From? • Worldwide problem • Almost every country is a source of DDoS attacks • Many DDoS attacks originate from: – Compromised servers at hosting providers that don’t clean up malware – Servers out of reach of international authorities • China is the leading source of botnet activity • The United States is the second leading source 6
  7. 7. www.prolexic.com Why Do DDoS Attackers Strike? • Hacktivisim and ideological and political differences • Extortion and other financial motivation • Competitive attacks and hate crimes by disgruntled employees or unhappy customers • Hacker experimentation – novices trying to make a name for themselves • Download the white paper for more details 7
  8. 8. www.prolexic.com DDoS Attackers Target Many Industries • e-Commerce • Education • Energy • Finance, banking and insurance • Government and defense • Healthcare • Internet and telecom • Media and entertainment • Non-profits • Retail • Technology • Travel 8
  9. 9. www.prolexic.com Download the Free White Paper • Download the white paper DDoS Boot Camp: Basic Training for an Increasing Cyber Threat at http://www.prolexic.com/bootcamp. • The white paper includes: – What is DDoS – Types of DDoS attacks and their relative popularity – Insight into hacker mindsets and motives – How different attacks target specific network weaknesses – DDoS mitigation best practices for incident response and business continuity – A case study of successful DDoS attack readiness 9
  10. 10. www.prolexic.com About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. • Prolexic has successfully stopped DDoS attacks for more than a decade. • We can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers. 10

×