Discussion: Distributed denial-of-service protection: How to stop D

ITKE SearchSecurity.com Staff Profile: ITKE
In this tip, which is a part of our Web Application Attacks Security Guide, you will learn what a distributed denial-of service (DDoS) attack is, and learn how to stop and prevent DDoS attacks by using intrusion prevention technologies and products.

1 Comment on this article

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.
  • Ken Harthun
    Connection verification can be quite effective. Another effective technique is IP profiling and counting of connection attempts. In such a case, some method of comparing the expected average connection type and volume to current conditions becomes essential. Still, even with such advanced algorithms, it is nearly impossible to determine with perfect certainty whether a connection attempt is valid traffic or coming in as part of a coordinated DDoS attack.

    Read Security Corner for practical security tips.
    2,300 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.


Share this item with your network: