User Tools

Site Tools


wiki:ddos_investigation

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

wiki:ddos_investigation [2023/04/11 08:00] – created summitwiki:ddos_investigation [2023/04/11 08:03] (current) summit
Line 1: Line 1:
-**Legacy DDoS Mitigation Methods** +**Investigating a DDoS attack on an IIG (International Internet Gateway) network requires a comprehensive approach that involves several steps:**
-{{:blocking_ddos_in_the_old_days.jpg?1000|}} +
-{{:ddos_mitigation_using_scrubbing_center.jpg?1000|}} +
-{{:source_remotely_triggered_black_hole.jpg?1000|}}+
  
-**DDoS Mitigation Using Scrubbing Center** +**Monitor network traffic:** Use network monitoring tools to monitor incoming traffic to the IIG networkLook for any unusual patterns or spikes in traffic that could indicate a DDoS attack.
- +
-{{:screencapture-imperva-products-infrastructure-ddos-protection-services-2023-03-11-04_03_35.png?1000|}} +
- +
-[[https://www.youtube.com/watch?v=Uk_FUREn9DU]] +
- +
-[[https://www.imperva.com/products/infrastructure-ddos-protection-services/]] +
- +
  
 +**Identify the type of attack:** Determine the type of DDoS attack being used against the IIG network. This could be a volumetric attack, a protocol-based attack, or an application-layer attack.
  
 +**Block malicious traffic:** Use traffic filtering tools to block traffic from the malicious sources. This could include IP blocking, port blocking, or traffic rerouting to the DDoS scrubbing center.
  
  
 +{{:screencapture-portal-kentik-v4-library-dashboards-1790-2023-03-11-02_33_52.png?1000|}}
  
  
 +{{ :screencapture-portal-kentik-v4-library-dashboards-1790-2023-03-11-02_33_52.pdf |}}
  
wiki/ddos_investigation.1681200024.txt.gz · Last modified: 2023/04/11 08:00 by summit