Presented By Presented To
VISHESH SINGHAL MS.NISHA WADHWA
MCA 4th Semester Asst Professor
15713 MCA(PIET)
 DoS
 Project Shield
 Protection from DDoS
 Mechanism of Project Shield
 Advantages
 Challenges
 Conclusion
 Bibliography
 A Distributed Denial of Service (DDoS) attack
is an attempt to make an online service
unavailable by overwhelming it with traffic
from multiple sources. They target a wide
variety of important resources, from banks to
news websites, and present a major challenge
to making sure people can publish and access
important information.
 Project Shield is a free anti-distributed-
denial-of-service (anti-DDoS) service that is
offered by Jigsaw, a subsidiary of Google's
parent company, Alphabet Inc. to websites
that have "media, elections, and human rights
related content.
 Project Shield is a free service that uses
Google technology to protect news sites and
free expression from DDoS attacks on the
web.
 Project Shield is a reverse proxy, Project
Shield servers receive traffic requests on your
website's behalf and then sends safe traffic to
your website's server.
 This protects your site against distributed
denial of service (DDoS) attacks in two ways:
1. Filtration of harmful traffic
2. Absorption of traffic through caching
Filtration of harmful traffic
Project Shield filters out harmful traffic using
Google’s technology and DDoS tools. If
someone tries to take your website down with
a DDoS attack, Project Shield can identify and
block harmful traffic so your website stays up
and running.
Absorption of traffic through caching
Project Shield can cache — or save — versions of
your content to serve to website visitors. This
reduces traffic requests to your website
server and absorbs potential DDoS attacks. For
example, if many visitors want to view the same
content on your website (or, in a DDoS attack, an
attacker is trying to overwhelm your website with
traffic), Project Shield will fetch the content from
your website's server once and then serve a
cached copy repeatedly.
Project shield
Review traffic and filter out bad requests
Attacks are blocked
Content is served back to the user
Reverse proxy in Google's data centers
Review traffic and filter out bad requests
When someone visits your website, the
request comes to Project Shield first so that
we can filter out bad requests.
Attacks are blocked
If it looks like the traffic is an attack, we
reject the request and prevent it from
reaching your server.
Reverse proxy in Google's data centers
User requests enter Google’s network at a
location close to the end user, and then are
proxied through the nearest Google Cloud
data center. This improves performance and
reduces latency.
 Content is served back to the user
We retrieve the requested site content either
from our cache or from your server and send
it back to the user. By serving content from
cache, we reduce the load on your server and
improve performance for the end user.
1. Protection from DDoS
2. Free of cost
3. Real-time site analytics
DISADVANTAGES
1. No protection from Hacker
2. Size Limitation
 Protection from Malicious intruder
 World wide Access
 More security
 This initiative by google is the long jump in
Information security.
 If this project is applied in a proper manner
this can be proved as a mile stone in the
cyber world .
 https://projectshield.withgoogle.com
 https://en.wikipedia.org/wiki/Project_Shield
 https://support.google.com/projectshield/an
swer/6358888
Project shield

More Related Content

PPTX
Newslynx Media Impact Project
PPTX
Surviving a DDOS Attack
PDF
HIPAA_Awareness_for_Healthcare_Providers_Certificate_for_Kazi_Muhammad_Rashid
PDF
Road to Microservices
PDF
About Microservices
PDF
Secure Computing IEEE 2014 Projects
PDF
Secure computing-ieee-2014-projects
PPTX
What are the different types of blockchain technology explained
Newslynx Media Impact Project
Surviving a DDOS Attack
HIPAA_Awareness_for_Healthcare_Providers_Certificate_for_Kazi_Muhammad_Rashid
Road to Microservices
About Microservices
Secure Computing IEEE 2014 Projects
Secure computing-ieee-2014-projects
What are the different types of blockchain technology explained

Similar to Project shield (20)

PPT
EC3401 Networks security PRAVEEN KUMAR K
PPT
Network security
PPT
Lec21 security
PPT
Lec21 security
PPTX
Lesson 3 - Network Security.pptx
PPT
Network security
PDF
Ddos- distributed denial of service
PPT
Lec21 security
PDF
Distributed Denial of Services (DDoS) Attacks Conceptual Intro
PPT
Lec21 security
PPT
INTERNET SECURITY.ppt
PPT
my lecture 21.network security.2023.ppt
PPT
lec21-security.ppt
PPT
lec21-securitytcp attacks and others.ppt
PPT
lec21-security.ppt
PPT
Network Security
PPT
Network security of internet of things.ppt
PPT
network.ppt
PPT
lec21-security.ppt
PPT
Chapter_Five[1].ppt
EC3401 Networks security PRAVEEN KUMAR K
Network security
Lec21 security
Lec21 security
Lesson 3 - Network Security.pptx
Network security
Ddos- distributed denial of service
Lec21 security
Distributed Denial of Services (DDoS) Attacks Conceptual Intro
Lec21 security
INTERNET SECURITY.ppt
my lecture 21.network security.2023.ppt
lec21-security.ppt
lec21-securitytcp attacks and others.ppt
lec21-security.ppt
Network Security
Network security of internet of things.ppt
network.ppt
lec21-security.ppt
Chapter_Five[1].ppt
Ad

More from Vishesh Singhal (6)

PPTX
Sharing and setting in salesforce
PPTX
Profiles and permission sets
PPTX
Encryption field and named credentials
PPTX
Google Lens
PPTX
Ethical hacking
PPTX
Li fi technology
Sharing and setting in salesforce
Profiles and permission sets
Encryption field and named credentials
Google Lens
Ethical hacking
Li fi technology
Ad

Recently uploaded (20)

PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
International_Financial_Reporting_Standa.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
HVAC Specification 2024 according to central public works department
Chinmaya Tiranga quiz Grand Finale.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
Weekly quiz Compilation Jan -July 25.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
International_Financial_Reporting_Standa.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
History, Philosophy and sociology of education (1).pptx
20th Century Theater, Methods, History.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
IGGE1 Understanding the Self1234567891011
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Complications of Minimal Access-Surgery.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Introduction to pro and eukaryotes and differences.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...

Project shield

  • 1. Presented By Presented To VISHESH SINGHAL MS.NISHA WADHWA MCA 4th Semester Asst Professor 15713 MCA(PIET)
  • 2.  DoS  Project Shield  Protection from DDoS  Mechanism of Project Shield  Advantages  Challenges  Conclusion  Bibliography
  • 3.  A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
  • 4.  Project Shield is a free anti-distributed- denial-of-service (anti-DDoS) service that is offered by Jigsaw, a subsidiary of Google's parent company, Alphabet Inc. to websites that have "media, elections, and human rights related content.  Project Shield is a free service that uses Google technology to protect news sites and free expression from DDoS attacks on the web.
  • 5.  Project Shield is a reverse proxy, Project Shield servers receive traffic requests on your website's behalf and then sends safe traffic to your website's server.  This protects your site against distributed denial of service (DDoS) attacks in two ways: 1. Filtration of harmful traffic 2. Absorption of traffic through caching
  • 6. Filtration of harmful traffic Project Shield filters out harmful traffic using Google’s technology and DDoS tools. If someone tries to take your website down with a DDoS attack, Project Shield can identify and block harmful traffic so your website stays up and running.
  • 7. Absorption of traffic through caching Project Shield can cache — or save — versions of your content to serve to website visitors. This reduces traffic requests to your website server and absorbs potential DDoS attacks. For example, if many visitors want to view the same content on your website (or, in a DDoS attack, an attacker is trying to overwhelm your website with traffic), Project Shield will fetch the content from your website's server once and then serve a cached copy repeatedly.
  • 9. Review traffic and filter out bad requests Attacks are blocked Content is served back to the user Reverse proxy in Google's data centers
  • 10. Review traffic and filter out bad requests When someone visits your website, the request comes to Project Shield first so that we can filter out bad requests. Attacks are blocked If it looks like the traffic is an attack, we reject the request and prevent it from reaching your server.
  • 11. Reverse proxy in Google's data centers User requests enter Google’s network at a location close to the end user, and then are proxied through the nearest Google Cloud data center. This improves performance and reduces latency.
  • 12.  Content is served back to the user We retrieve the requested site content either from our cache or from your server and send it back to the user. By serving content from cache, we reduce the load on your server and improve performance for the end user.
  • 13. 1. Protection from DDoS 2. Free of cost 3. Real-time site analytics DISADVANTAGES 1. No protection from Hacker 2. Size Limitation
  • 14.  Protection from Malicious intruder  World wide Access  More security
  • 15.  This initiative by google is the long jump in Information security.  If this project is applied in a proper manner this can be proved as a mile stone in the cyber world .