Attacks are increasing in number, size and intensity -- your organization could be next. DDoS protection must be a key tenant of an organization's overall security posture.
In this IDG webcast, security industry expert Eric Vanderburg along with Michael Kaczmarek, Vice President, Product Management at Neustar, explore the latest DDoS attack vectors, including application and protocol attacks, and explain the most effective defensive strategies, including:
- Traffic pattern analysis
- Signature analysis
- State transition analysis
- Intrusion detection
- Response rate limiting
- Perimeter traffic rules