A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
DDoS Attack Objectives
The attackers seek to cause key online business services to become unavailable at critical times and expect payment for an attack to cease. For example:
Preventing customers from placing bets within an online gambling portal in the run up to a major sporting event and requiring payment to prevent a DDoS occurring on game day.
VoIP calls are made continuously to an organization’s phone and fax numbers thereby preventing any in-bound communications. Automatic messages are played to anyone answering the phone that payment is expected for the calling to cease.
The Cost of a DDoS Attack
According to the results of a study conducted by Kaspersky Lab and B2B International, a DDoS attack on a company’s online resources might cause considerable losses – with average figures ranging from $52,000 to $444,000 depending on the size of the company. For many organizations, these expenses have a serious impact on the balance sheet as well as harming the company’s reputation due to loss of access to online resources for partners and customers.
What Is Anti-DDoS
Simply put, anti-DDoS is the aggregation of hardware, software and IT policies implemented by a data center or Internet Service Provider to prevent and mitigate Distributed Denial of Service attacks. Prevention and mitigation are two separate activities which are conducted separately, and both must be undertaken to effectively fight off these ever-more-common and ever-larger assaults on Internet servers and facilities.
How Is DDoS Mitigated
Part of the battle against DDoS attacks involves prevention. That’s done through a combination of “blocking all of the doors” through which hackers and other bad guys commonly launch their forays (this includes measures like hardening firewalls and load balancers, blocking unused ports and implementing packet restrictions), robust monitoring software that also blocks problem IPs, and having an excess of bandwidth plus distributing traffic across as many machines or data centers as possible in order to withstand volumetric blasts.
Some attacks, though, can’t be prevented. The bigger issue is stopping them from taking down your servers and denying service to your customers once they’re underway. But how is DDoS mitigated?
The most effective method is to engage the services of a third-party service to “scrub” traffic, only allowing legitimate requests to make it all the way to the company’s servers or infrastructure. At the first sign of an attack, all traffic headed for the target machine(s) is rerouted directly to the DDoS mitigation service, which operates on the cloud. Through comprehensive analysis, green-lighted traffic is sent to its destination with no noticeable lag time, malicious traffic is blocked completely, and suspicious traffic is checked further until it can be categorized. With this method, data centers and servers remain fully active and are able to serve legitimate clients, while the brunt of the attack is sent off into the cloud where it won’t cause trouble.
The same techniques can be implemented in-house with extra hardware, software, and bandwidth, but the costs are prohibitive for most companies. In-house DDoS prevention, coupled with third-party DDoS mitigation, is the approach that makes sense for the majority of potential targets – which includes just about anyone doing business online.
Here are the Top 5 DDOS attack protection Providers:-
DDoS protection from Akamai:-
Akamai provides DDoS protection for some of the biggest brands in the world, many of which are targeted by DDoS attacks on a regular basis. Akamai Kona Site Defender delivers a multi-layered defense that effectively protects websites and web applications against the increasing threat, sophistication and scale of DDoS attacks.
Kona Site Defender provides unmatched web and application protection delivered through an intelligent platform with more than 210,000 servers over 120 countries. Network-layer DDoS traffic is deflected and application-layer DDoS traffic is absorbed at the network edge, while mitigation capabilities are implemented natively in-path, protecting against attacks in the cloud before they reach the customer origin. With a highly scalable Web Application Firewall (WAF) offering protection against application-layer attacks in HTTP and HTPS traffic, this powerful Akamai solution provides all the DDoS protection enterprises need to maintain web performance and availability.
The Silverline DDoS Protection service complements F5’s on-premises DDoS Protection solutions to protect organizations against the full spectrum of modern attacks. This end-to-end solution detects and mitigates mid-volume, SSL, or application-targeted attacks, stopping even the largest volumetric attacks from reaching the network.
With a frequently updated list of threat sources and high-risk IP addresses, Silverline Threat Intelligence delivers context and analysis to identify and block malicious communications from multiple sources. This managed service is only available as an add-on to either Silverline DDoS Protection or the Silverline Web Application Firewall.
3. DDOS Protection By Arbor networks
Arbor provides the industry’s most comprehensive suite of DDoS attack protection products and services for the Enterprise, Cloud / Hosting and Service Provider markets. Whether it be fully managed DDoS protection services; virtual, in-cloud or on-premise DDoS mitigation appliances; or embedded DDoS solutions within existing Cisco ASR 9000 routers, Arbor has the deployment model, scalability and pricing flexibility to meet the DDoS protection needs of any organization operating online today.
4.Incapsula DDoS protection:-
Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets.
5.DDoS Protection By CloudFlare
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplificatio, and Layer 7 attacks.
Other DDOS Attack Protection Providers
All comparison is based on my research and my own industry experience.
I am recommending you to read An Introduction to DDoS Attacks and Defense Mechanisms and DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance.
If you have any query, feel free to comment.