SlideShare a Scribd company logo
DDoS Incident Monitoring
Solution Use Case
OVERVIEW
DDoS (Distributed Denial of Service) is a malicious attack against an organization's network,
application/website or services essentially rendering those resources unavailable. Cyber criminals
use multiple methods to carry out these attacks. For example, in 2018, one of the largest attacks
saw a 1.4 Tbps flood of traffic aimed at Github’s website, taking it offline briefly. When these
attacks occur the consequences vary. In 2017 it was estimated that the average cost of a DDoS
attack was approximately $2.5 million USD. But it’s more than just financial; in today’s social
climate, brand recognition and loss of consumer trust have a huge impact on a business.
It is important an organization is be able to identify, detect and protect against these attacks.
Many organizations have traditional network monitoring solutions in place which can identify
anomalies such as an increase in throughput or bandwidth consumption over their network.
Organizations may also employ the services of a DDoS mitigation provider, for example, Neustar,
or Akamai/Prolexic. The provider will use a number of strategies to mitigate the attack including
redirecting the organization’s traffic through its own network (scrubbing centers) to remove the
malicious traffic. Organizations may subscribe to a service in which they are always monitored
and protected (always-on) or to which traffic is redirected only when they are under attack.
HOW THOUSANDEYES IS RELEVANT
ThousandEyes provides an external perspective into an application's performance, monitoring
DDoS attacks while in progress. ThousandEyes visualizes the impact of an ongoing DDoS attack,
shows the effectiveness (or otherwise) of the response and records performance data for real-time
sharing and detailed forensics.
ThousandEyes makes it easy to understand the impact of a DDoS attack on the digital experience
as well as the improvement delivered by DDOS detection and mitigation services while the attack
is in progress, specifically:
• Clearly track the impact of DDoS attacks to see what is being stressed: DNS, ISP networks,
edge routers or an overloaded application server.
• Identify underperforming elements within your cloud mitigation provider such as overloaded
scrubbing centers or misrouted traffic.
• Easily correlate this information against baseline traffic behavior, compare time periods and
save data for later forensics.
The figure above shows BGP path changes made to mitigate the DDoS against Github. Dotted
red lines donate paths withdrawn, while solid red show new advertisements. The figure shows
traffic being switched to Prolexic for scrubbing. (Note: only three BGP monitors shown to reduce
diagram complexity).
© Cisco Systems, all rights reserved. Version 2.0. March ’21. Author: Bob P. boporter@cisco.com
ThousandEyes
Partner
CDX
Solution Use Case - DDoS Incident Monitoring
Page 2
CUSTOMER USE CASE EXAMPLE
A major US bank runs BGP tests to monitor their Akamai/Prolexic prefixes to ensure availability
for a quick migration of traffic in the event of an attack against their infrastructure.
The benefit of this is the bank can see if their mitigation provider successfully moves their traffic
and allows them to restore connectivity and performance.
Additionally, several DDoS mitigation providers are customers of ThousandEyes. They use
ThousandEyes to monitor and optimize their DDoS Infrastructure. It’s important for them to make
sure migrations are smooth, paths are optimal and customer performance is maintained.
FAQ
How are you able to detect a DDoS attack?
ThousandEyes customers monitor their end customer-facing services from many vantage points
across a region or the globe. A key characteristic of a DDOS attack is the simultaneous degradation of
service as seen from many of these vantage points together.
Are you able to show the before, during and after a DDoS attack for forensic purposes - may
affect your compliance posture?
Yes. Since ThousandEyes provides the ability to navigate test results forwards and backwards in time,
this can readily be done. The ability to generate snapshots of data across a time duration for later
offline review is also key.
Do you have to set up separate tests to identify when an attack is occurring and how it impacts
different assets?
Essentially, no. Since ThousandEyes users are usually already testing end-customer facing assets
from a geographically dispersed set of cloud agents the affects of a DDOS attack will be captured.
However, customers may elect to setup tests to mitigation providers to ensure timely availability.
Finally, customers may decide to run BGP monitoring tests for their entire address space in the case
their app-related tests don’t cover the full space. This BGP monitoring aids the monitoring of DDOS
mitigation response.
ADDITIONAL REFERENCE MATERIAL
• Blog post: How GitHub Successfully Mitigated a DDoS Attack
• Blog post: Neustar Protects Digital Businesses using ThousandEyes
• Background info: Understanding DDoS
ThousandEyes
Partner

More Related Content

Similar to Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf

ddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future direction
moataz82
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Cloudflare
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
Pedro Espinosa
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
IJCNCJournal
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
IJECEIAES
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
MazeBolt Technologies
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
MazeBolt Technologies
 
20160316_tbk_bit_module7
20160316_tbk_bit_module720160316_tbk_bit_module7
20160316_tbk_bit_module7
University of Twente
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paper
Renny Shen
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
Symantec
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
 
DDoS Protection - Detect & Mitigate DDoS Attacks
DDoS Protection -  Detect & Mitigate DDoS AttacksDDoS Protection -  Detect & Mitigate DDoS Attacks
DDoS Protection - Detect & Mitigate DDoS Attacks
NikitaJain90132
 
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
Case Study:  Q2 2014 Global DDoS Attack Report | Akamai  DocumentCase Study:  Q2 2014 Global DDoS Attack Report | Akamai  Document
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
Prolexic
 
Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016
Hope Frank
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET Journal
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
MazeBolt Technologies
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)
Martin Cabrera
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
Cloudflare
 
Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
Kasper de Waard
 

Similar to Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf (20)

ddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future directionddo-s attacks in cloud computing issued taxonomy and future direction
ddo-s attacks in cloud computing issued taxonomy and future direction
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Protecting against modern ddos threats
Protecting against modern ddos threatsProtecting against modern ddos threats
Protecting against modern ddos threats
 
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKSMAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case StudyEliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
Eliminate DDoS Mitigation False Positive | DDoS Protection | Case Study
 
20160316_tbk_bit_module7
20160316_tbk_bit_module720160316_tbk_bit_module7
20160316_tbk_bit_module7
 
comparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-papercomparing-approaches-for-web-dns-infrastructure-security-white-paper
comparing-approaches-for-web-dns-infrastructure-security-white-paper
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
DDoS Protection - Detect & Mitigate DDoS Attacks
DDoS Protection -  Detect & Mitigate DDoS AttacksDDoS Protection -  Detect & Mitigate DDoS Attacks
DDoS Protection - Detect & Mitigate DDoS Attacks
 
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
Case Study:  Q2 2014 Global DDoS Attack Report | Akamai  DocumentCase Study:  Q2 2014 Global DDoS Attack Report | Akamai  Document
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
 
Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016Nexusguard Selected Entrepreneurial Company 2016
Nexusguard Selected Entrepreneurial Company 2016
 
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
IRJET- EEDE- Extenuating EDOS for DDOS and Eluding HTTP Web based Attacks in ...
 
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBoltDDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 
Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
 

More from منیزہ ہاشمی

less08.ppt
less08.pptless08.ppt
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
منیزہ ہاشمی
 
Pricing_101_v2.pdf
Pricing_101_v2.pdfPricing_101_v2.pdf
Pricing_101_v2.pdf
منیزہ ہاشمی
 
Pricing_103_-_services.pdf
Pricing_103_-_services.pdfPricing_103_-_services.pdf
Pricing_103_-_services.pdf
منیزہ ہاشمی
 
Solution_Use_Case_-_CDN_Performance_Monitoring.pdf
Solution_Use_Case_-_CDN_Performance_Monitoring.pdfSolution_Use_Case_-_CDN_Performance_Monitoring.pdf
Solution_Use_Case_-_CDN_Performance_Monitoring.pdf
منیزہ ہاشمی
 
Solution_Use_Case_-_Collaboration_Services_Monitoring.pdf
Solution_Use_Case_-_Collaboration_Services_Monitoring.pdfSolution_Use_Case_-_Collaboration_Services_Monitoring.pdf
Solution_Use_Case_-_Collaboration_Services_Monitoring.pdf
منیزہ ہاشمی
 
97 Things Every Cloud Engineer Should Know.pdf
97 Things Every Cloud Engineer Should Know.pdf97 Things Every Cloud Engineer Should Know.pdf
97 Things Every Cloud Engineer Should Know.pdf
منیزہ ہاشمی
 

More from منیزہ ہاشمی (7)

less08.ppt
less08.pptless08.ppt
less08.ppt
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
Pricing_101_v2.pdf
Pricing_101_v2.pdfPricing_101_v2.pdf
Pricing_101_v2.pdf
 
Pricing_103_-_services.pdf
Pricing_103_-_services.pdfPricing_103_-_services.pdf
Pricing_103_-_services.pdf
 
Solution_Use_Case_-_CDN_Performance_Monitoring.pdf
Solution_Use_Case_-_CDN_Performance_Monitoring.pdfSolution_Use_Case_-_CDN_Performance_Monitoring.pdf
Solution_Use_Case_-_CDN_Performance_Monitoring.pdf
 
Solution_Use_Case_-_Collaboration_Services_Monitoring.pdf
Solution_Use_Case_-_Collaboration_Services_Monitoring.pdfSolution_Use_Case_-_Collaboration_Services_Monitoring.pdf
Solution_Use_Case_-_Collaboration_Services_Monitoring.pdf
 
97 Things Every Cloud Engineer Should Know.pdf
97 Things Every Cloud Engineer Should Know.pdf97 Things Every Cloud Engineer Should Know.pdf
97 Things Every Cloud Engineer Should Know.pdf
 

Recently uploaded

UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
AI-Based Home Security System : Home security
AI-Based Home Security System : Home securityAI-Based Home Security System : Home security
AI-Based Home Security System : Home security
AIRCC Publishing Corporation
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
cannyengineerings
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 

Recently uploaded (20)

UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
AI-Based Home Security System : Home security
AI-Based Home Security System : Home securityAI-Based Home Security System : Home security
AI-Based Home Security System : Home security
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 

Solution_Use_Case_-_DDoS_Incident_Monitoring.pdf

  • 1. DDoS Incident Monitoring Solution Use Case OVERVIEW DDoS (Distributed Denial of Service) is a malicious attack against an organization's network, application/website or services essentially rendering those resources unavailable. Cyber criminals use multiple methods to carry out these attacks. For example, in 2018, one of the largest attacks saw a 1.4 Tbps flood of traffic aimed at Github’s website, taking it offline briefly. When these attacks occur the consequences vary. In 2017 it was estimated that the average cost of a DDoS attack was approximately $2.5 million USD. But it’s more than just financial; in today’s social climate, brand recognition and loss of consumer trust have a huge impact on a business. It is important an organization is be able to identify, detect and protect against these attacks. Many organizations have traditional network monitoring solutions in place which can identify anomalies such as an increase in throughput or bandwidth consumption over their network. Organizations may also employ the services of a DDoS mitigation provider, for example, Neustar, or Akamai/Prolexic. The provider will use a number of strategies to mitigate the attack including redirecting the organization’s traffic through its own network (scrubbing centers) to remove the malicious traffic. Organizations may subscribe to a service in which they are always monitored and protected (always-on) or to which traffic is redirected only when they are under attack. HOW THOUSANDEYES IS RELEVANT ThousandEyes provides an external perspective into an application's performance, monitoring DDoS attacks while in progress. ThousandEyes visualizes the impact of an ongoing DDoS attack, shows the effectiveness (or otherwise) of the response and records performance data for real-time sharing and detailed forensics. ThousandEyes makes it easy to understand the impact of a DDoS attack on the digital experience as well as the improvement delivered by DDOS detection and mitigation services while the attack is in progress, specifically: • Clearly track the impact of DDoS attacks to see what is being stressed: DNS, ISP networks, edge routers or an overloaded application server. • Identify underperforming elements within your cloud mitigation provider such as overloaded scrubbing centers or misrouted traffic. • Easily correlate this information against baseline traffic behavior, compare time periods and save data for later forensics. The figure above shows BGP path changes made to mitigate the DDoS against Github. Dotted red lines donate paths withdrawn, while solid red show new advertisements. The figure shows traffic being switched to Prolexic for scrubbing. (Note: only three BGP monitors shown to reduce diagram complexity). © Cisco Systems, all rights reserved. Version 2.0. March ’21. Author: Bob P. boporter@cisco.com ThousandEyes Partner CDX
  • 2. Solution Use Case - DDoS Incident Monitoring Page 2 CUSTOMER USE CASE EXAMPLE A major US bank runs BGP tests to monitor their Akamai/Prolexic prefixes to ensure availability for a quick migration of traffic in the event of an attack against their infrastructure. The benefit of this is the bank can see if their mitigation provider successfully moves their traffic and allows them to restore connectivity and performance. Additionally, several DDoS mitigation providers are customers of ThousandEyes. They use ThousandEyes to monitor and optimize their DDoS Infrastructure. It’s important for them to make sure migrations are smooth, paths are optimal and customer performance is maintained. FAQ How are you able to detect a DDoS attack? ThousandEyes customers monitor their end customer-facing services from many vantage points across a region or the globe. A key characteristic of a DDOS attack is the simultaneous degradation of service as seen from many of these vantage points together. Are you able to show the before, during and after a DDoS attack for forensic purposes - may affect your compliance posture? Yes. Since ThousandEyes provides the ability to navigate test results forwards and backwards in time, this can readily be done. The ability to generate snapshots of data across a time duration for later offline review is also key. Do you have to set up separate tests to identify when an attack is occurring and how it impacts different assets? Essentially, no. Since ThousandEyes users are usually already testing end-customer facing assets from a geographically dispersed set of cloud agents the affects of a DDOS attack will be captured. However, customers may elect to setup tests to mitigation providers to ensure timely availability. Finally, customers may decide to run BGP monitoring tests for their entire address space in the case their app-related tests don’t cover the full space. This BGP monitoring aids the monitoring of DDOS mitigation response. ADDITIONAL REFERENCE MATERIAL • Blog post: How GitHub Successfully Mitigated a DDoS Attack • Blog post: Neustar Protects Digital Businesses using ThousandEyes • Background info: Understanding DDoS ThousandEyes Partner