SlideShare a Scribd company logo
Presented By Presented To
VISHESH SINGHAL MS.NISHA WADHWA
MCA 4th Semester Asst Professor
15713 MCA(PIET)
 DoS
 Project Shield
 Protection from DDoS
 Mechanism of Project Shield
 Advantages
 Challenges
 Conclusion
 Bibliography
 A Distributed Denial of Service (DDoS) attack
is an attempt to make an online service
unavailable by overwhelming it with traffic
from multiple sources. They target a wide
variety of important resources, from banks to
news websites, and present a major challenge
to making sure people can publish and access
important information.
 Project Shield is a free anti-distributed-
denial-of-service (anti-DDoS) service that is
offered by Jigsaw, a subsidiary of Google's
parent company, Alphabet Inc. to websites
that have "media, elections, and human rights
related content.
 Project Shield is a free service that uses
Google technology to protect news sites and
free expression from DDoS attacks on the
web.
 Project Shield is a reverse proxy, Project
Shield servers receive traffic requests on your
website's behalf and then sends safe traffic to
your website's server.
 This protects your site against distributed
denial of service (DDoS) attacks in two ways:
1. Filtration of harmful traffic
2. Absorption of traffic through caching
Filtration of harmful traffic
Project Shield filters out harmful traffic using
Google’s technology and DDoS tools. If
someone tries to take your website down with
a DDoS attack, Project Shield can identify and
block harmful traffic so your website stays up
and running.
Absorption of traffic through caching
Project Shield can cache — or save — versions of
your content to serve to website visitors. This
reduces traffic requests to your website
server and absorbs potential DDoS attacks. For
example, if many visitors want to view the same
content on your website (or, in a DDoS attack, an
attacker is trying to overwhelm your website with
traffic), Project Shield will fetch the content from
your website's server once and then serve a
cached copy repeatedly.
Review traffic and filter out bad requests
Attacks are blocked
Content is served back to the user
Reverse proxy in Google's data centers
Review traffic and filter out bad requests
When someone visits your website, the
request comes to Project Shield first so that
we can filter out bad requests.
Attacks are blocked
If it looks like the traffic is an attack, we
reject the request and prevent it from
reaching your server.
Reverse proxy in Google's data centers
User requests enter Google’s network at a
location close to the end user, and then are
proxied through the nearest Google Cloud
data center. This improves performance and
reduces latency.
 Content is served back to the user
We retrieve the requested site content either
from our cache or from your server and send
it back to the user. By serving content from
cache, we reduce the load on your server and
improve performance for the end user.
1. Protection from DDoS
2. Free of cost
3. Real-time site analytics
DISADVANTAGES
1. No protection from Hacker
2. Size Limitation
 Protection from Malicious intruder
 World wide Access
 More security
 This initiative by google is the long jump in
Information security.
 If this project is applied in a proper manner
this can be proved as a mile stone in the
cyber world .
 https://projectshield.withgoogle.com
 https://en.wikipedia.org/wiki/Project_Shield
 https://support.google.com/projectshield/an
swer/6358888
Project shield

More Related Content

Similar to Project shield

ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
R. Blake Martin
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
Tushar Mathur
 
Surviving a DDOS Attack
Surviving a DDOS AttackSurviving a DDOS Attack
Surviving a DDOS Attack
Eduserv
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
HTS Hosting
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
MazeBolt Technologies
 
Study of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptxStudy of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptx
vasep68958
 
Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
Gaurav Bhatia
 
DDoS Protection - Detect & Mitigate DDoS Attacks
DDoS Protection -  Detect & Mitigate DDoS AttacksDDoS Protection -  Detect & Mitigate DDoS Attacks
DDoS Protection - Detect & Mitigate DDoS Attacks
NikitaJain90132
 
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdfSolution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf
منیزہ ہاشمی
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
WebGuru Infosystems Pvt. Ltd.
 
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docxUnlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
jolleybendicty
 
Real time detection of application-layer d do-s attack using time series anal...
Real time detection of application-layer d do-s attack using time series anal...Real time detection of application-layer d do-s attack using time series anal...
Real time detection of application-layer d do-s attack using time series anal...
yito24
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS Providers
Neil Hinton
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
IJERA Editor
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
Pedro Espinosa
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
PrasannaKumarpanda2
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security Threats
HTS Hosting
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
Sharon Lee
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
tim4911
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
IJCNCJournal
 

Similar to Project shield (20)

ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 
DDoS Report.docx
DDoS Report.docxDDoS Report.docx
DDoS Report.docx
 
Surviving a DDOS Attack
Surviving a DDOS AttackSurviving a DDOS Attack
Surviving a DDOS Attack
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
 
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
 
Study of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptxStudy of System Attacks- DoS.pptx
Study of System Attacks- DoS.pptx
 
Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
 
DDoS Protection - Detect & Mitigate DDoS Attacks
DDoS Protection -  Detect & Mitigate DDoS AttacksDDoS Protection -  Detect & Mitigate DDoS Attacks
DDoS Protection - Detect & Mitigate DDoS Attacks
 
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdfSolution_Use_Case_-_DDoS_Incident_Monitoring.pdf
Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docxUnlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
Unlimited Attempts AllowedDetailsVirtual Labs Perpetrators of D.docx
 
Real time detection of application-layer d do-s attack using time series anal...
Real time detection of application-layer d do-s attack using time series anal...Real time detection of application-layer d do-s attack using time series anal...
Real time detection of application-layer d do-s attack using time series anal...
 
The role of DDoS Providers
The role of DDoS ProvidersThe role of DDoS Providers
The role of DDoS Providers
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security Threats
 
Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )Distributed Denial Of Service ( Ddos )
Distributed Denial Of Service ( Ddos )
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
 

More from Vishesh Singhal

Sharing and setting in salesforce
Sharing and setting in salesforceSharing and setting in salesforce
Sharing and setting in salesforce
Vishesh Singhal
 
Profiles and permission sets
Profiles and permission setsProfiles and permission sets
Profiles and permission sets
Vishesh Singhal
 
Encryption field and named credentials
Encryption  field and named credentials Encryption  field and named credentials
Encryption field and named credentials
Vishesh Singhal
 
Google Lens
Google LensGoogle Lens
Google Lens
Vishesh Singhal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
Vishesh Singhal
 

More from Vishesh Singhal (6)

Sharing and setting in salesforce
Sharing and setting in salesforceSharing and setting in salesforce
Sharing and setting in salesforce
 
Profiles and permission sets
Profiles and permission setsProfiles and permission sets
Profiles and permission sets
 
Encryption field and named credentials
Encryption  field and named credentials Encryption  field and named credentials
Encryption field and named credentials
 
Google Lens
Google LensGoogle Lens
Google Lens
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
 

Recently uploaded

How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 

Recently uploaded (20)

How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 

Project shield

  • 1. Presented By Presented To VISHESH SINGHAL MS.NISHA WADHWA MCA 4th Semester Asst Professor 15713 MCA(PIET)
  • 2.  DoS  Project Shield  Protection from DDoS  Mechanism of Project Shield  Advantages  Challenges  Conclusion  Bibliography
  • 3.  A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
  • 4.  Project Shield is a free anti-distributed- denial-of-service (anti-DDoS) service that is offered by Jigsaw, a subsidiary of Google's parent company, Alphabet Inc. to websites that have "media, elections, and human rights related content.  Project Shield is a free service that uses Google technology to protect news sites and free expression from DDoS attacks on the web.
  • 5.  Project Shield is a reverse proxy, Project Shield servers receive traffic requests on your website's behalf and then sends safe traffic to your website's server.  This protects your site against distributed denial of service (DDoS) attacks in two ways: 1. Filtration of harmful traffic 2. Absorption of traffic through caching
  • 6. Filtration of harmful traffic Project Shield filters out harmful traffic using Google’s technology and DDoS tools. If someone tries to take your website down with a DDoS attack, Project Shield can identify and block harmful traffic so your website stays up and running.
  • 7. Absorption of traffic through caching Project Shield can cache — or save — versions of your content to serve to website visitors. This reduces traffic requests to your website server and absorbs potential DDoS attacks. For example, if many visitors want to view the same content on your website (or, in a DDoS attack, an attacker is trying to overwhelm your website with traffic), Project Shield will fetch the content from your website's server once and then serve a cached copy repeatedly.
  • 8.
  • 9. Review traffic and filter out bad requests Attacks are blocked Content is served back to the user Reverse proxy in Google's data centers
  • 10. Review traffic and filter out bad requests When someone visits your website, the request comes to Project Shield first so that we can filter out bad requests. Attacks are blocked If it looks like the traffic is an attack, we reject the request and prevent it from reaching your server.
  • 11. Reverse proxy in Google's data centers User requests enter Google’s network at a location close to the end user, and then are proxied through the nearest Google Cloud data center. This improves performance and reduces latency.
  • 12.  Content is served back to the user We retrieve the requested site content either from our cache or from your server and send it back to the user. By serving content from cache, we reduce the load on your server and improve performance for the end user.
  • 13. 1. Protection from DDoS 2. Free of cost 3. Real-time site analytics DISADVANTAGES 1. No protection from Hacker 2. Size Limitation
  • 14.  Protection from Malicious intruder  World wide Access  More security
  • 15.  This initiative by google is the long jump in Information security.  If this project is applied in a proper manner this can be proved as a mile stone in the cyber world .