Points above, and ask yourself the following questions: Look at the results of your analysis, based on the Guarantees to ensure full protection against any type of DDoS threat. Protection service should provide you with technology, Your protection in anticipation of next time? The damages, any potential weak spots, and the effectiveness of your existingĭefenses, now is the time to ask yourself whether you should upgrade Once you have completed an assessment of the attack, In effect, this is a measurement of the effectiveness of mitigation, since it verifies that malicious traffic is actually being stopped, and defense are not just deployed ineffectively. This metric tests the ratio of bad traffic that is allowed to go through versus bad traffic that is stopped. Not including this metric effectively allows the DDoS service provider to define for themselves the time when mitigation should begin.Īnother important metric is ‘ Consistency of Mitigation’. When it comes to protection against DDoS attacks, there are a number of key metrics that can be verified and measured:Īny DDoS protection service worth its while will commit to all six of these metrics.Ī particularly important KPI is the ‘ Time-to-Detect’ metric, since it measures how quickly the attack is detected, and as a result – from when does the mitigation clock begin. Now is the time to check that they met their SLA commitments. If you have a pre-existing DDoS mitigation service in place, Identifying weak spots in your armor helps you to address them in the next steps. Even though not a result of the attack itself, for end customers the experience is the same… If your protections are deployed too broadly, this can lead to false-positives which prevent legitimate users from accessing services. Or – conversely – were there specific services that were impacted while othersĪnother key element to look at is false positives. Was there a particular type of attack that was able to get through, Only what resources were impacted, but also why they were Positives? What was the ratio of legitimate traffic to malicious traffic thatīy identifying weak spots, you should try to understand not
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |