**Investigating a DDoS attack on an IIG (International Internet Gateway) network requires a comprehensive approach that involves several steps:** **Monitor network traffic:** Use network monitoring tools to monitor incoming traffic to the IIG network. Look for any unusual patterns or spikes in traffic that could indicate a DDoS attack. **Identify the type of attack:** Determine the type of DDoS attack being used against the IIG network. This could be a volumetric attack, a protocol-based attack, or an application-layer attack. **Block malicious traffic:** Use traffic filtering tools to block traffic from the malicious sources. This could include IP blocking, port blocking, or traffic rerouting to the DDoS scrubbing center. {{:screencapture-portal-kentik-v4-library-dashboards-1790-2023-03-11-02_33_52.png?1000|}} {{ :screencapture-portal-kentik-v4-library-dashboards-1790-2023-03-11-02_33_52.pdf |}}