Research Library > Arbor > Downtime by DDoS: Taking an Integrated Multi-Layered Approach

Downtime by DDoS: Taking an Integrated Multi-Layered Approach

White Paper Published By: Arbor
Arbor
Published:  Sep 15, 2014
Type:  White Paper
Length:  12 pages

DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.

Availability of web-based resources, from public facing websites to internal business applications, is essential to business continuity.  The threats have become so complex, and the consequences so high, no organization can afford to ignore their DDoS protection plans.

In this paper, you will learn:

  • How the threat landscape has changed
  • Why multi-layer defense is only way to ensure availability
  • What industry analysts consider best practice for DDoS protection



Tagsddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention