Cisco - Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Click here to download now
Overview: In order to facilitate Distributed Denial of Service (DDoS), the attackers need to have several hundred to several thousand compromised hosts. The process of compromising a host and installing the tool is automated. Because an automated process is used, attackers can compromise and install the tool on a single host in under 5 seconds. This white paper contains information to help the reader understand how DDoS attacks are orchestrated, recognize programs used to facilitate DDoS attacks, apply measures to prevent the attacks, gather forensic information if a person suspects an attack, and learn more about host security.