Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Ultimate Guide To DDoS Protection: Strategies And Best Practices
Newest First  |  Oldest First  |  Threaded View
Kaiying Fu
50%
50%
Kaiying Fu,
User Rank: Author
10/11/2016 | 3:28:43 AM
Re: Most efficient
I completely agree, the scrubbing of traffic needs to be automated. There are a ton of other fixes people have that are inadequate when you think about how web attacks are often delivered in a cocktail. Moving away from shared hosting, trying their hands at iptables scripting, CDN load balancing, and as the author has pointed out, flow monitoring. These are all great to avoid downtime, but what about data theft and malware introduced through secondary attacks?

If automated traffic scrubbing is the most efficient in successful DDoS mitigation, and the problem is cost, we need innovation in how such services are provided. Yes it has traditionally been very costly. Depending on your business's needs however, paid protection could be more affordable if the price model switched from per feature pricing to traffic-based pricing.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/31/2016 | 10:48:18 AM
Most efficient
"Mitigation: Your detection solution needs to be able to trigger automated mitigation, directing traffic to a scrubber appliance or service."


I have found this to be the most efficient means of mitigating a ddos attack. Unfortunately it is also the most costly. Another method is utilizing your ISP at the top of the pipe but again depending on how large the attack it may not be sufficient.
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
5/31/2016 | 8:13:58 AM
More work to do
It is good to see that there are legitimate strategies in place for organisations in dealing with DDOS attacks these days, but I feel like a lot more needs to be done. It's still far too common to try and use monstrous sites and services and to find them unusable because of a dedicated attack.

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-43698
PUBLISHED: 2021-11-29
An unspecified version of phpWhois is affected by a Cross Site Scripting (XSS) vulnerability. In file example.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is a XSS vulnerability.
CVE-2021-24918
PUBLISHED: 2021-11-29
The Smash Balloon Social Post Feed WordPress plugin before 4.0.1 did not have any privilege or nonce validation before saving the plugin's setting. As a result, any logged-in user on a vulnerable site could update the settings and store rogue JavaScript on each of its posts and pages.
CVE-2021-24927
PUBLISHED: 2021-11-29
The My Calendar WordPress plugin before 3.2.18 does not sanitise and escape the callback parameter of the mc_post_lookup AJAX action (available to any authenticated user) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue
CVE-2017-20008
PUBLISHED: 2021-11-29
The myCred WordPress plugin before 1.7.8 does not sanitise and escape the user parameter before outputting it back in the Points Log admin dashboard, leading to a Reflected Cross-Site Scripting
CVE-2021-24745
PUBLISHED: 2021-11-29
The About Author Box WordPress plugin before 1.0.2 does not sanitise and escape the Social Profiles field values before outputting them in attributes, which could allow user with a role as low as contributor to perform Cross-Site Scripting attacks.