Site icon TechNewsBoy.com

Explainer: Blackhole routing, rate limiting and other strategies used against DDoS cyberattack – Times of India

In our previous article, we explained about a DDoS or a Distributed-Denial-of-Service cyberattack, what it is, how it is carried out and how you can recognise that your internet service is a victim of such an attack. Here, we throw some light on the strategies used by cyber experts to mitigate a DDoS cyberattack. These include Blackhole Routing, Rate Limiting, Web Application Firewall and Anycast Network Diffusion. Let’s go over them one by one.
Blackhole routing
If it is established that an internet property is under a DDoS attack, then the internet service provider (ISP) of that property may create a null route or a blackhole and dump or funnel all the network traffic into it, both legit and malicious. This technique is not the most helpful one as it makes the network inaccessible, something that the hackers want.
Rate limiting
This is a preventive measure, a defensive technique used against DDoS attacks. By Rate limiting, we mean reducing or limiting the number of requests an internet server can accept in a certain time period. While this method may not be powerful enough to handle a complex DDoS cyberattack on its own, it certainly helps in slowing down the hackers from stealing information by making their job more difficult.
Web application firewall
A Web Application Firewall (WAF) is put between the internet and the origin server, and thus it can protect the server from attacks by acting as a reverse proxy. The firewall helps filter the requests the origin server receives.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – abuse@technewsboy.com. The content will be deleted within 24 hours.
Exit mobile version