From the course: Ethical Hacking: Denial of Service
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Defeating denial-of-service attacks
From the course: Ethical Hacking: Denial of Service
Defeating denial-of-service attacks
- [Instructor] There are a number of methods that can be used to defeat denial of service attacks, or at least to try. These come into one of two categories: mitigation through design and operational mitigation. Mitigation through design includes establishing the capability for priority-based servicing, egress filtering, and ingress filtering. Operational mitigation includes IP address verification and dropping spoofed packets, rate limiting, ACLs, understanding the characteristics of malicious traffic and dropping it, and understanding the characteristics of normal traffic and dropping anomalies. Priority-based servicing of traffic can be achieved by ensuring network traffic is marked with a priority attribute, and network queues are managed by priority. This is a common voice call service offered by telecommunications companies to support responders under emergency conditions. Under normal conditions, all traffic gets processed. But when congested, the traffic queues are ordered by…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.