Call Now: (877) UNIXDEV
Portal HomeClient AreaAnnouncementsKnowledgebaseSupport TicketsDownloads

You are here: Portal Home > Knowledgebase > Networking > State of the Art filtering techniques

State of the Art filtering techniques

Internet Defense Network Protection & State of the Art filtering techniques

+ What is a DoS attack and what is a DDoS attack? What’s the difference between the two?

A Denial-of-Service (DoS) attack occurs when disruptive traffic is sent from one host to a computer resource with the intent of disrupting an online application or service either temporarily or permanently. A DDoS (Distributed Denial-of-Service) attack occurs when multiple hosts (such as compromised PCs) are leveraged to carry out an attack, amplifying the attack and making it extremely difficult (if not impossible) to track the source. DDoS attacks intentionally deprive legitimate users of Internet resources by overloading a network with a flood of data packets from multiple sources.
Targets can include, but are not limited to Web Servers, DNS servers, applications servers, routers, firewalls, and Internet bandwidth. Attackers usually create the denial-of-service condition by either consuming server bandwidth or by impairing the server itself.

+ Why are DDoS attacks a growing concern for businesses?

DDoS attacks are growing in size and strength due to multiple factors. Rapidly growing bandwidth, increased sophistication of online criminals, global unemployment and underemployment amongst highly technical, educated workers and other factors have led to a dramatic rise in both methods and motivations for attacks. Criminals have learned that there is far less risk of getting caught and prosecuted by carrying out their activities online, such as launching a DDoS attack, instead of conducting more physical crimes.
In addition, malevolent actors are constantly developing new ways to harness thousands of compromised computers to form “botnets” capable of launching far larger attacks than those seen in the past. Recent estimates suggest that anywhere between 4 and 6 million computers are actively used in botnets at any time, silently sending malicious traffic around the globe and avoiding detection from individual users. Harnessing the processing power and bandwidth of thousands of individual compromised computers can bring down even the largest and most sophisticated Web servers.

+ How do DDoS attacks impact businesses and organizations financially?

A 24-hour outage for a large e-commerce company can easily cost tens of millions of dollars. Recent international attacks have effectively blocked not only commercial providers, but the Internet infrastructure itself – shutting down banks, government offices, and service providers. The reputation damage caused by an outage can also be devastating. In addition, the cost of preparing for attacks is growing. As attack sizes increase, so too must an organization’s defenses to protect against them. That translates into an investment in bandwidth, hardware, and the staff to manage both.

+ How do existing solutions in the market help companies mitigate DDoS attacks, and why aren’t they always effective?

Most companies’ traditional security approaches have focused on the hardening of defenses at their network edge, or at the point of ingress of data to their systems. These prevention methods include firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are usually offered through hardware providers or as part of a managed security service offering.
Unfortunately, all of these methods leave gaps that malicious actors actively work to exploit or bypass. Deployed services typically require that the hardware or software supplier remedy the vulnerability first, and then deploy to their customer base. By the time most security solutions have adjusted and deployed a response, the attackers have already taken advantage of the gap, and have moved on to even more current means and methods to outwit them. A virtualized solution can react much more quickly as it requires updates to a consolidated, shared infrastructure, rather than through a distribution channel. Also, solutions which rely on scalable hardware also face the problem that they require more and more capital to keep up with the ever-increasing volumes from larger attacks.

+ What are the advantages of being behind our Internet Defense Network?

Key advantages of our Internet Defense Network include:
• Does not require replacement of current solutions, and instead adds a seamless, easy-to-implement complement to your security portfolio.
• Can free up resources, enabling you to focus on other critical network operational activities and security threats.
• Provides a range of service models to accommodate the needs of both enterprise companies and smaller firms which rely upon the Internet for business-critical applications and services.
• Is network agnostic, so it can be implemented regardless of which Internet Services you or your company use with us.
• It is an "in the cloud" solution, and therefore requires no customer premise equipment that can become outdated or obsolete in the face of evolving attacks.


Was this answer helpful?

Add to Favourites
Print this Article

Powered by WHMCompleteSolution