wiki:ddos_investigation
Differences
This shows you the differences between two versions of the page.
wiki:ddos_investigation [2023/04/11 08:00] – created summit | wiki:ddos_investigation [2023/04/11 08:03] (current) – summit | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | **Legacy | + | **Investigating a DDoS attack on an IIG (International Internet Gateway) network requires a comprehensive approach that involves several steps:** |
- | {{: | + | |
- | {{: | + | |
- | {{: | + | |
- | **DDoS Mitigation Using Scrubbing Center** | + | **Monitor network traffic:** Use network monitoring tools to monitor incoming traffic to the IIG network. Look for any unusual patterns or spikes in traffic that could indicate a DDoS attack. |
- | + | ||
- | {{: | + | |
- | + | ||
- | [[https:// | + | |
- | + | ||
- | [[https:// | + | |
- | + | ||
+ | **Identify the type of attack:** Determine the type of DDoS attack being used against the IIG network. This could be a volumetric attack, a protocol-based attack, or an application-layer attack. | ||
+ | **Block malicious traffic:** Use traffic filtering tools to block traffic from the malicious sources. This could include IP blocking, port blocking, or traffic rerouting to the DDoS scrubbing center. | ||
+ | {{: | ||
+ | {{ : | ||
wiki/ddos_investigation.1681200024.txt.gz · Last modified: 2023/04/11 08:00 by summit