KNOWLEDGE CENTER

INFOGRAPHIC

Hundreds of millions of data points pour into a DDoS mitigation platform in real-time. Prolexic’s human mitigation method allows for potent distillation for clear and effective results with a highly identifiable attack fingerprint.

Embed Code:

Fingerprinting a DDoS Attack

Hundreds of millions of data points pour into a DDoS mitigation platform in real-time. Prolexic’s human mitigation method allows for potent distillation for clear and effective results with a highly identifiable attack fingerprint.

This DDoS mitigation infographic reveals:

  • When a DDoS attack takes place hundreds of millions of data points pour into a DDoS mitigation platform in real-time
  • The DDoS mitigation service decides which network traffic to let through and which to block
  • To make this decision, the DDoS mitigation service must find answers to a complex set of preliminary questions about the data
  • The DDoS mitigation service stores billions of attack metrics in data centers and the cloud
  • The goal is to make all incoming attack data useful to humans
  • The problem is that there is a gap between what automated data analytics can do and what malicious actors can do live behind their botnets
  • Unfortunately, automatic decision making equipment is prone to false positives
  • Typical automated data analysis methods lead to murky results and an unclear fingerprint
  • The Prolexic human DDoS mitigation method is a crucial extra step that leads to clear and effective results with a highly identifiable attack fingerprint

Register to access the Data Analytics and DDoS Mitigation: Lessons Learned white paper

 
Data Analytics and DDoS Mitigation: Lessons Learned

Learn how to collect, measure and correlate your network traffic data to provide insight into DDoS defense strategies. DOWNLOAD NOW >>