From the course: Ethical Hacking: Denial of Service

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Defeating denial-of-service attacks

Defeating denial-of-service attacks

From the course: Ethical Hacking: Denial of Service

Start my 1-month free trial

Defeating denial-of-service attacks

- [Instructor] There are a number of methods that can be used to defeat denial of service attacks, or at least to try. These come into one of two categories: mitigation through design and operational mitigation. Mitigation through design includes establishing the capability for priority-based servicing, egress filtering, and ingress filtering. Operational mitigation includes IP address verification and dropping spoofed packets, rate limiting, ACLs, understanding the characteristics of malicious traffic and dropping it, and understanding the characteristics of normal traffic and dropping anomalies. Priority-based servicing of traffic can be achieved by ensuring network traffic is marked with a priority attribute, and network queues are managed by priority. This is a common voice call service offered by telecommunications companies to support responders under emergency conditions. Under normal conditions, all traffic gets processed. But when congested, the traffic queues are ordered by…

Contents