Denial of Service attacks make systems unavailable by overwhelming them with traffic or exploiting vulnerabilities.
Volumetric attacks flood your network with more traffic than it handles. Attackers use botnets of compromised devices.
Protocol attacks exploit network protocol weaknesses. SYN floods exhaust connection tables.
Application layer attacks target web apps with seemingly legitimate requests.
Defenses include:
- DDoS mitigation services
- Rate limiting per IP address
- Geographic filtering
- Anycast routing