Your DDoS protection planning resource
Distributed denial of service (DDoS) attacks are constantly evolving, so it’s important to stay up-to-date on the latest DDoS trends as well as DDoS detection and mitigation tools and techniques.
Everything you want to know about how Prolexic approaches DDoS detection and mitigation is here in our Knowledge Center. Register to receive free access to download this valuable information.
DDoS protection planning white papers
Prolexic publishes white papers for both business and technical audiences. Our Executive Suite Series papers are ideal for C-level executives (CEO, COO, CFO, CSO) that want to get up-to-speed quickly on DDoS threats, the business implications of DDoS attacks, and how to effectively defend against them. Our Technical Series papers provide a more in-depth look at DDoS mitigation and threats from an IT perspective. Technical Series papers are ideal for CIOs as well as IT and security managers.
Executive Suite Series
- White Paper – Man, Machine and DDoS Mitigation: The Case for Human Cyber Security Expertise
Read why human DDoS expertise is critical to effective mitigation and why automated tools have limited use.
- White Paper – Safeguarding e-Commerce Revenues from DDoS Attacks in Q4
Learn about Q4 DDoS attacks, the many different areas of your business they can affect, and how a faster DDoS mitigation response can reduce the length of site outages and revenue loss.
- White Paper – DDoS Boot Camp: Basic Training for an Increasing Cyber Threat
Learn about DDoS attacks and best practices for incident response and business continuity.
- White Paper – Data Analytics and DDoS Mitigation: Lessons Learned
Learn how to collect, measure and correlate your network traffic data to provide insight into DDoS defense strategies.
- White Paper – The Broad Impact of DDoS: It’s More Than Just an IT Issue
Learn about the far-reaching affects of a DDoS attack, how to minimize the impact across your enterprise by developing a DDoS mitigation playbook, and how to evaluate DDoS mitigation service providers.
- White Paper – Planning for and Validating a DDoS Defense Strategy
Learn how to test your mitigation strategy and build an effective “play book” against DDoS attacks.
- White Paper – Four Reasons Why DDoS Attackers Strike
This white paper explores why DDoS attackers strike and provides guidance on how to recognize the warning signs that a web site may be particularly vulnerable to attack.
- White Paper – Plan vs. Panic Making a DDoS Mitigation "Play Book" Part of Your Incident Response Plan
This white paper explores how to build a "play book" and why it is the foundation for an effective, controlled response in the event of a DDoS attack.
- DrDoS Series White Paper – Gaming Attacks
DrDoS and DDoS attacks involving the online video gaming community are widespread and harm gaming and non-gaming targets alike. Learn more in this white paper.
- DrDoS Series White Paper – SYN Reflection Attacks
SYN reflection attacks are potent and unmanned DDoS mitigation devices can create backscatter, compounding the effects of the attack. Learn how to identify and stop these attacks.
- DrDoS Series White Paper – SNMP, NTP & CHARGEN Attacks
The network protocols SNMP, NTP and CHARGEN are being leveraged by cyber attackers. Even printers are at risk! Find out how to minimize your exposure and mitigate these attacks.
- DrDoS Series Overview – Distributed Reflection Denial of Service (DrDoS) Attacks
An introduction to DrDoS attacks, an often overlooked DDoS attack method, and the potential security vulnerabilities that can expose you to DrDoS attacks. Each white paper in the series will include real-world case studies observed by PLXsert.
- DrDoS Series White Paper – DNS Reflection Attacks
DNS server and IT administrators, get prepared by learning how cyber attackers use domain name (DNS) servers to reflect and amplify DDoS attacks to hit their ultimate target.
- Ovum – Tackling the DDoS Threat to Banking in 2014
Analyst Rik Turner considers banks' options in the current DDoS environment, DDoS risks, and DDoS mitigation methods for the best DDoS protection.
- Ovum – Delivering effective DDoS protection
Analyst Andrew Kellett reviews enterprise security needs and recommends 10 key criteria for selecting a DDoS security supplier for effective DDoS protection.
- IDC Analyst Connection – Denial of Service: What to Look for in a Provider
Get IDC security services program director Christina Richmond’s answers to five key questions about DDoS and DDoS mitigation providers.
Technical Series White Papers
- DDoS Attacks Against Global Markets
This PLXsert analysis of global DDoS attacks indicates cyber attackers are using DDoS attacks to influence market values and interfere with exchange platforms.
- Reflection Attack Tools and the DDoS Marketplace
New methods, tools and services, including CHARGEN-based attacks, are proliferating in the DDoS marketplace, fueling a surge in DrDoS attacks. Learn more, plus how to remediate a vulnerable protocol
- White Paper – Risk Rating Analysis of DDoS Attacks: How the integration of the MIDAS Scoring System with NIST CVSSv2 can improve DDoS risk assessment
This white paper outlines how to adapt the MIDAS scoring system and blend those results with the NIST CVSSv2 calculator for a more accurate risk rating analysis of DDoS threats.
- White Paper – Firewalls: Limitations When Applied to DDoS Protection
What role does your firewall play in your DDoS mitigation strategy? This white paper helps you understand and define what your firewall can and cannot do for you.
- White Paper – Twelve Questions to Ask a DDoS Mitigation Provider
Arm yourself with 12 powerful questions to ask any DDoS mitigation provider and ensure you’re getting the right protection for your business.
- White Paper – How to Defend Against DDoS Attacks: Strategies for the Network, Transport, and Application Layers
This white paper will explore a sampling of DDoS attack types and discuss the various strategies used to defend against them. It will also discuss the benefits of investing in dedicated DDoS mitigation services as a first line of defense to both discourage cyber threats and provide fast, reliable, and real-time mitigation when an attack occurs.
Fragrance and Beauty Products Retailer
A DDoS attack takes down this popular site for 24 hours. Prolexic restores in 5 minutes.DOWNLOAD CASE STUDY >>
Leading Online Jewelry Retailer
A DDoS attack took down the site of a premier jewelry retailer for nearly three days.DOWNLOAD CASE STUDY >>
Online Options Trading
Financial services firm avoids extortion attempt. Prolexic keeps web site up during vicious Layer 7 attack.DOWNLOAD CASE STUDY >>
When others couldn't mitigate the latest DDoS attack, a "daily deal" web site called Prolexic: problem solved in 2 hours.DOWNLOAD CASE STUDY >>
A Leading Content Rating Organization
A 9 million packets per second DDoS attack brings down web site before Prolexic steps in.DOWNLOAD CASE STUDY >>
Spa and Wellness Firm
Prolexic quickly stops a combination Layer 4 and 7 DDoS attack after a host's mitigation capabilities falls short.DOWNLOAD CASE STUDY >>
Prolexic mitigates GET flood in minutes for new client after Sunday night emergency call.DOWNLOAD CASE STUDY >>
Web site building and hosting services firm
Prolexic mitigates Layer 4 UDP flood peaking at 6.2 Gbps. Protects 6 million Yolasites.DOWNLOAD CASE STUDY >>
Online Movie Subscription Service
After seeing all traffic route to Prolexic, hackers pull the plug on DDoS attack.DOWNLOAD CASE STUDY >>
IPG Holdings Limited
Prolexic mitigates Layer 7 GET floods targeting payment processing platform.DOWNLOAD CASE STUDY >>
Prolexic mitigates politically motivated attacks against web hosting company's clients.DOWNLOAD CASE STUDY >>
Financial Services Firm Global eSolutions
Prolexic mitigates Layer 3, 4 and 7 attacks against Forex trading platform.DOWNLOAD CASE STUDY >>
Krebs on Security
Prolexic fends off Pandora DNS amplification attacks for popular cyber security blog.DOWNLOAD CASE STUDY >>
e-Commerce Provider of Printed Promotion Items
Prolexic mitigates two-week Layer 7 DDoS attack campaign.DOWNLOAD CASE STUDY >>
Global Blogging Site
Prolexic protects freedom of speech for 30 million users targeted by six-month political DDoS campaign.DOWNLOAD CASE STUDY >>
Online Credit Card Site
Prolexic mitigates Layer 4 DDoS attacks against Ixaris site, EntroPay.com.DOWNLOAD CASE STUDY >>
e-Commerce Web Site
Prolexic mitigates 25-40 Gbps Layer 3 DDoS attacks against online auto parts retailer.DOWNLOAD CASE STUDY >>
Timepieces e-Commerce Site
Prolexic keeps World of Watches ticking after DDoS attack flood site.DOWNLOAD CASE STUDY >>
Prolexic mitigates 16-hour Layer 7 DDoS attack on software distribution site.DOWNLOAD CASE STUDY >>
Henyep Capital Markets
Prolexic keeps Henyep accessible and trading through multiple SYN, GET and ICMP flood attacks.DOWNLOAD CASE STUDY >>
Australia’s #1 Job Search Website
Prolexic keeps Seek.com.au online and incident-free for millions of job seekers.DOWNLOAD CASE STUDY >>
e-Commerce Hosting Provider for Top Tier Sites
Prolexic keeps Americaneagle.com and its customers generating revenueDOWNLOAD CASE STUDY >>
Popular Online Betting Site Doesn’t Gamble with DDoS
Prolexic ensures Betstar’s online services are reliable and incident freeDOWNLOAD CASE STUDY >>
Customer ROI requires online accessibility and reliability
Prolexic ensures Clickpoint! Media's online services are available and incident-freeDOWNLOAD CASE STUDY >>
University Federal Credit Union
Prolexic's mitigation services now protect credit union with US$1.6 Billion in assetsDOWNLOAD CASE STUDY >>
Prolexic mitigates 70 Gbps SYN flood DDoS attack for popular ink retailerDOWNLOAD CASE STUDY >>
Arab National Bank
Builds strong DDoS defense to serve online banking customers and e-trade siteDOWNLOAD CASE STUDY >>
OnCourse Systems for Education
Prolexic succeeded where two other mitigation firms failedDOWNLOAD CASE STUDY >>
Akamai & Prolexic
Web Security & Data center protection for the evolving threat landscapeLEARN MORE >>
Ovum: The DDoS threat to banking
Why banks need both DDoS attack absorption and scrubbing for DDoS mitigationLEARN MORE >>
Q1 2014 Global DDoS Attack Report
Malicious actors choose reflection, not infection for DDoS attacksLEARN MORE >>