DDOS Attacks and Protection

DDOS attacks, or Distributed Denial of Service attacks, are a form of network attacks aimed at disabling the functionality of a network being targeted. These attacks generally come in the form of either individuals spamming a network to slow it down or create instability, or a bot that systematically attacks a network or series of networks. DDOS protection is the only security for these types of attacks.

DDOS Attacks and Protection


DDOS attacks are more common today because of the wide reaching availability of networks, cloud computing, and "always on" technology in which a network is never offline. Commonly these attacks are taken out on businesses and organizations that are operating in competition to another person's goal. Meaning that instead of harassing a company in person, a group of hackers or another business may launch a DDOS attack as a means of crippling an organization's ability to function.

Even large companies with extremely sophisticated networks are at risk. As recently as 2010, a DDOS attack was launched on PayPal and MasterCard during the height of the WikiLeaks news. The attack was aimed at those companies after they refused to process donations to WikiLeaks. Whichever side of the issue you stand on, doesn't take away from the fact that vulnerability lies at every level of business.

Because of the prevalence of this type of attack, there are many DDOS protection methods available today. To decide which DDOS protection method is right for your particular business depends on the architecture and needs of your network. The key to stopping a DDOS attack is pro-active DDOS protection aimed at identifying the attacking traffic and stopping it as soon as possible.

Firewalls

Firewalls are typically the first method employed in DDOS protection. Firewalls are constantly running, and act as the gate keeper to your castle (network). Once an attack is realized, the first option is to block traffic from the particular IP address that is sending the traffic. In more complex attacks, there will be a system of computers on different IP addresses, so ad-hoc blocking is not most effective tool for DDOS protection. If traffic is all centered on a specific port, then that port can be shut-off until the attack is over. This is an issue if the port being attacked is 80 (internet traffic) as that would shut down all internet traffic to the network. Often times, firewalls are deep in the hierarchy of a network, protection at the switch level may be more appropriate.

Switches

Today's switches are very sophisticated and have constantly running DDOS protection. Switches can use rate limiting, which caps an amount of traffic coming in or out thus denying any chance of overflowing a network's capacity. Also, deep packet inspection offers switches the ability to inspect each packet being sent through before allowing on to the network. Switches can also use Bogon Filtering which blocks bogus IP addresses that may be originating from a DDOS source. This is good to have in case the IP filtering of the Firewall is unable to stop that method of intrusion.

DDOS protection is must for any network today. Attackers do not always have a reason for attack other than "watching the world burn". While the reason behind the attack may be unclear, an unprotected network is vulnerable to these attacks at any time. In the world of network protection, DDOS protection is the defense in a "defense is the best offense" strategy.

The author of this article, Petra Gordon, has written many Technology articles in the past. As a point of reference, readers may want to check out DOSArrest, which has a lot of trusted and reliable information on DDos technology.

Article Source: http://EzineArticles.com/8145401

Related Posts:

  • Types of Computer Security Threats With the wide scale use of internet, there are different types of computer threats, that the computer networks are susceptible to. Each of these threats can cause potential damage and cause a lot of harm, if the data… Read More
  • Ebook Fundamentals of Network Security Ebook Fundamentals of Network Security Summary This book network security is not a hacker's guide, nor is it in tended for the experien ced computer security professional. I don't claim to be a comput… Read More
  • How to Manually Remove a Virus Our computers have a threat from different types of computer viruses. In this write-up, we will know how to make our computers free of viruses. Computers have become an integral part of our life. Along with com… Read More
  • How to Clean An Infected Computer The truth is that it's a lot easier to keep a computer malware free than it is to clean one that is already infected. However, with the advice given in this article you should be able to remove any type of malware from… Read More
  • Bluetooth Security These days, all communication technology faces the issue of privacy and identity theft, with Bluetoothbeing no exception.  Almost everyone knows that email services and networks require security.  What users of Blu… Read More