Properly implemented DDoS mitigation is what keeps websites online during an attack. Explore the process of DDoS mitigation and the important characteristics to look for in a mitigation service.
After reading this article you will be able to:
Related Content
What is a DDoS attack?
What is a denial-of-service (DoS) attack?
DNS flood attack
Web application firewall (WAF)
Ping of death (historic)
Subscribe to theNET, Cloudflare's monthly recap of the Internet's most popular insights!
Copy article link
DDoS mitigation refers to the process of successfully protecting a targeted server or network from a distributed denial-of-service (DDoS) attack. By utilizing specially designed network equipment or a cloud-based protection service, a targeted victim is able to mitigate the incoming threat.
There are 4 stages of mitigating a DDoS attack using a cloud-based provider:
Traditional DDoS mitigation solutions involved purchasing equipment that would live on site and filter incoming traffic. This approach involves purchasing and maintaining expensive equipment, and also relied on having a network capable of absorbing an attack. If a DDoS attack is large enough, it can take out the network infrastructure upstream preventing any on-site solution from being effective. When purchasing a cloud-based DDoS mitigation service, certain characteristics should be evaluated.
DDoS mitigation protects a network or server from a distributed denial-of-service attack. The goal is to keep a website or service online by dropping attack traffic and absorbing the rest of the traffic.
DDoS mitigation solutions use several factors to identify legitimate traffic, including common attack patterns, IP reputation, and historical data. This ensures that when a site experiences a surge of real visitors they are not accidentally blocked or throttled.
Once a threat is identified, the protection network drops malicious bot traffic while absorbing the remaining traffic. An effective solution will also route traffic into manageable segments to prevent denial of service in the event of abnormal traffic volume.
A larger network allows a provider to analyze data from millions of websites globally to identify changing protocols and attack vectors. Having an extensive data transfer capacity helps providers respond to and stop attacks more efficiently, sometimes before they even start.
Scalable cloud solutions for DDoS mitigation are designed to handle large attacks that can exceed 2 terabits per second (Tbps). Unlike on-site hardware, which can be overwhelmed by large attacks that take out upstream infrastructure, cloud-based networks are large enough to absorb these massive volumes of traffic. Cloud-based DDoS mitigation also avoids the latency incurred by the use of scrubbing centers: remote data centers through which all network traffic must pass so that malicious traffic can be scrubbed.
A high-quality DDoS mitigation network constantly analyzes traffic to find attack patterns, such as specific protocols being misused or repeat offending IP blocks. By adapting to these patterns, the service can harden its defenses against future threats.
Reliability is maintained through a combination of high uptime rates, redundancy, and a global network of data centers. Additionally, having site reliability engineers available 24 hours a day to identify new threats is essential for a successful protection strategy.