DDoS Mitigation

What is DDoS mitigation

DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks. DDoS attacks are a constant threat to businesses and organizations by threatening service performance or to shut down a website entirely, even for a short time.

The first thing to do in DDoS mitigation is to identify normal conditions for network traffic by defining “traffic patterns”, which is necessary for threat detection and alerting. DDoS mitigation also requires identifying incoming traffic to separate human traffic from human-like bots and hijacked web browsers. The process is done by comparing signatures and examining different attributes of the traffic, including IP addresses, cookie variations, HTTP headers, and JavaScript footprints.

After the detection is made, the next process is filtering. Filtering can be done through anti-DDoS technology like connection tracking, IP reputation lists, deep packet inspection, blacklisting/whitelisting, or rate limiting.

One technique is to pass network traffic addressed to a potential target network through high-capacity networks with “traffic scrubbing” filters.

Manual DDoS mitigation is no longer recommended due to DDoS attackers being able to circumvent DDoS mitigation software that is activated manually. Other ways to prevent DDoS attacks can be implemented on-premise or/and via cloud-based solution providers. Through on-premise mitigation the technology (most commonly a hardware device) is placed in front of the network, with the disadvantage that the filtering capacity is limited to the capacity of the filtering device. A middle option is to have a hybrid solution by combining on-premise filtering with cloud-base filtering.

Best practices for DDoS mitigation include having both anti-DDoS technology and anti-DDoS emergency response services. DDoS mitigation is also available through cloud-based providers.

What we can offer:

Whit Balkan Internet Exchange mitigation service in place, organizations no longer need to be concerned with the possibility of network disruptions and can maintain excellent user response time even when under attack.

We can offer to our customers dedicated hardware that has the most accurate attack detection and prevention without blocking legitimate user’s traffic. We can maintain business continuity of operation even under network attacks, also centralized attack management, monitoring and reporting.

Contact Us for a FREE Trial

Contact us