MITIGATING MULTIPLE DDOS A­ACK VECTORS

8:21 PM
MITIGATING MULTIPLE DDOS A­ACK VECTORS INFOGRAPHIC
The following mindmap shows the detection methods (left) for DDoS attack categories (middle) and the mitigations (right)

MITIGATING MULTIPLE DDOS A­ACK VECTORS

By recognizing the four main categories of attack, security professionals can mitigate even previously unknown vectors:
1. Volumetric :Flooding
2. Computational Asymmetric : Consuming CPU cycles
3. Stateful Asymmetric :  Abusing memory
4. Vulnerability-based : Exploiting software vulnerabilities
5. Blended DDoS :  Combination of multiple attack vectors Security professionals need to understand How to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture. It's time torethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.
The following mindmap shows the detection methods (left) for DDoS attack categories (middle) and the mitigations (right)

Previous
Next Post »