Visit This Site

Neustar Hosting Webinar on DDOS Best Practices

March 16, 2015 – Neustar, a leading provider of DDOS mitigation services, is holding a webinar on Tuesday, March 17 at 2pm EST.  Here is the link…

“DDOS Attacks: More Dangerous to You, Never Easier to Launch.”

The webinar will include a guest speaker from IDC and will discuss DDOS attacks and how organizations can protect their web presence. Neustar recommends the following 8 guidelines for DDOS protection…

1.  Accuracy – The reputation of the provider you choose is very important.  Do they have a lot of customers that misuse the platform and suck up a lot of manpower and resources chasing down a minor attack, or not an attack at all.  Are they receiving reliable data on actual attacks as they are happening.

2.  Experience & Expertise – What’s the providers track record?  Ask for case studies, see an attack demonstration, tour the SOC, etc…

3.  Types of Attacks – What types of attacks can the provider mitigate?  There are many types of ddos attacks, such as Volumetric verse Application.  The former will overwhelm a site by brute force, while the latter are much more surgical and pinpointed attacks.  The provider needs to have the ability to identifying these attacks and then deploy the appropriate countermeasures.

4.  Protection Methods – Industry best practice is a combination of both hardware and cloud based protection.  Hybrid allows you to respond to attacks immediately and cloud offers the backup bandwidth to take on the larger 100+Gbps attacks.

5.  Scrubbing Capacity – Particularly lately, attacks have been upwards of 300+Gbps.  Make sure you’re provider has enough bandwidth to handle any size attack.  Close to 1 terabyte or more is best to scrub malicious traffic, while allowing legitimate traffic to pass through to your infrastructure.

6.  Fast Routing & Quick Failover – Cloud based mitigation requires proxying traffic to a scrubbing center which can take time and cause latency.  So make sure the attacks are routed intelligently to the closest location to reduce as much latency as possible.

7.  Usability & Deployment – DNS Redirection is a very simple method for protection.  Simply change a DNS record to point to a different address and within minutes you are under mitigation.

8.  DNS Based Protection – DNS is becoming a hot target for attack, so having a DNS service that is also protected is critical.  This could be managed in house or by a third party, but preferably by the same company offering DDOS mitigation.




Leave a review/comment

© Copyright 2008 by DNS Reviews