DDoS: the effective solution
Organisations must make sure that any DDoS solution they choose allows them to detect application-layer DDoS attacks
Organisations must make sure that any DDoS solution they choose allows them to detect application-layer DDoS attacks, efficiently block common, generic or custom DDoS attack techniques and patterns, and have the ability to recognise both acceptable and anomalous traffic behaviour patterns based on traffic flow, said to Bashar Bashaireh, senior regional director, Middle East & Pakistan, Fortinet.
“This traffic profiling is key as it helps detect and restrict threats faster while reducing the event of false positives. For greater operational efficiency, firms should also look at DDos solutions that offer advanced virtualisation and geo-location features,” he said.
With virtualisation, policy administrators can establish and oversee multiple independent policy domains within a single appliance, preventing attacks delivered in one network segment from impacting other network segments, according to Fortinet. This mechanism is also effective in defence escalation.
Rather than relying on a single set of policies, IT administrators can define multiple sets of policies in advance, which create the ability to apply a more stringent set of policies if the previous ones are deemed inadequate during the attack process.