×

HOW TO GET SUPPORT

1 Contact our expert personel
2 Problem Detection and Analysis
3 Permanent Solutions

If you still have problems, please let us know, by sending an email to info@nationalkeep.com . Thank you!

WORK HOURS

Mon-Fri 9:00AM - 6:00PM
Sat - 9:00AM-5:00PM
Sundays by appointment only!

DDoS ATTACK

NATIONAL KEEP

GET READY FOR A DDoS

Protocol & Application Based DDoS Attack

Guard Your Network

DDoS attacks come in different shapes and sizes.

Protocol-based DDoS Attack

Protocol-based attacks primarily focus on exploiting a weakness in Layer 3 or Layer 4 of the OSI layer. The most common example of a protocol-based DDoS attack is the TCP Syn Flood, wherein a succession of TCP SYN requests directed towards a target can overwhelm the target and make it unresponsive. The recent Dyn outage, apart from being an application-layer attack also consisted of TCP Syn floods targeting port 53 of Dyn’s DNS servers.

Application-based DDoS Attack

Application attacks are the trickiest of the DDoS attacks as they are harder to identify and in some cases even mitigate.Experts; “Application-layer attacks are the most sophisticated and stealthy attacks because they can be very effective with as few as one attacking machine generating traffic at a low rate. This makes these attacks very difficult to proactively detect with traditional flow-based monitoring solutions.”

TOP