SlideShare a Scribd company logo
Responses to 
10 Steps in Mitigating DDoS Attacks 
in Real Time 
B V S Narayana 
CISSP, CISA 
@bvsnarayana03 
layer4to7.wordpress.com
• Very recently a white paper was released by one of the 
IT vendor, on how to deal with a DDoS attack when 
they are struck with it. The document highlights 10 key 
factors, which they claim are the measures to be taken 
during the attack. But the document mostly deals with 
certain hypothesis and mostly approaches which are 
reactive in nature. 
• Next few slides highlight why these steps might not be 
helpful during DDoS crisis.
• Verify that there is an attack. 
Rule out common causes of an outage, such as DNS 
mis-configurations, upstream routing issues, and 
human error. 
• Response: 
This indicates that one should wait till they are 
attacked and not take any proactive measures to 
handle the attacks or mitigate them. This also hints at 
human intervention and decision to decide whether 
they are under attack or not. In such a scenario, one 
could most probably take a guess on the nature of 
traffic only if there is a spike. Otherwise, for any attacks 
which are taking place at normal traffic pattern are 
sure will be ignored. This puts any network at high risk.
• Contact your Team Leads. 
Here the vendor mentions that the network and application 
leads must be immediately contacted to verify the areas 
being attacked and to confirm the attack and areas 
affected. 
• Response: 
This is a tedious task and absolutely not sure if there would 
be a common affirmation for such case. On any normal day 
of business operation if the user complaints of slowness in 
application, both teams safeguard themselves and passes 
the blame on to the other team. Application team puts the 
cause of slowness on network and vice versa. How then 
under an attack scenario, one can expect the two teams to 
be cohesive and confirm whether or not its an attack and if 
it is, then confirm the magnitude.
• Triage your applications. 
The vendor mentions that during DDoS attack, focus should be on 
protecting the critical apps / revenue generators. 
Response: 
Now such decisions are a part of BCP/DR plan and the strategy is 
clearly defined on which apps are critical, when should the DR be 
invoked, what should be the RTO and RPO for such applications. 
One doesn’t decide about a critical application and the strategy to 
keep it live when struck by an attack. When under attack, you may 
affected at internet/mpls pipes, network devices like firewals, IPS, 
load balancer might be impacted, server infra might be hampered 
or the applications might be siffering. So irrespective of the 
strategy you have, even if you have good BCP in place, how do you 
ensure that the attack doesn’t reach your 2nd or 3rd DC or DR 
from where you host the business critical apps.
• Protect remote Users. 
Vendor asks to maintain White-List IP addresses and asks to 
propagate it across the network devices even up to the ISP. 
• Response: 
While internet is shrinking the world and businesses are striving 
to be available globally today, how easy it is for any organisation 
to know whether the genuine user should be hitting the 
application from US, UK, India etc. It is completely un-realistic 
and also not expected of the business to know the IP pool from 
where the users would access the application. Business in 
present era is all about being available to everyone from 
everywhere at all times. White-listing approach is not a fit and 
completely out of question to handle ddos.
• Classify the Attack. 
Whether the attack is Volumetric, Slow, Low? Service Provider must have 
already taken remediation steps. 
• Response: 
Here the hypothesis is that the customer is already subscribed to a 
mitigation service from ISP. Even bigger hypothesis is that the ISP is 
equipped to handle all types of DDoS attacks and is capable of identifying 
and mitigating them in real-time. If the hypothesis is correct and for 
assumption the ISP has really handled the attack, then what is the white 
paper published for? 
Customer if at all they are relying on the ISP, must understand what 
capabilities are built in his cloud to identify and mitigate various DDoS 
flavours. Whether the ISP is offering any SLA’s for availability, is there a level 
of transparency with customer on when the attack started, when it ended, 
actions taken, is there a portal for access to customer in real-time, whether 
the ISP is willing to sign a penalty clause in case attacks get leaked and reach 
to customer network.
• Evaluate Source address mitigation options. 
Vendor asks to identify the source of attacks and block the at 
firewall. 
Response: 
Gone are the days of DDoS attacks which emerged from a single 
source. Now with sophisticated tools and the reach of internet, 
attacks can be launched from anywhere from any no. of source 
IP’s, spoofed addresses, attacks might be coming from proxies 
or CDNs (which also carry legitimate traffic). How do you keep 
a track of the IPs in such scenario. Even if the IPs are tracked 
and ACL are applied at firewall or at perimeter routers, the 
attack has still reached those devices and might result in 
exhausting their resources or choking the entire service 
provider pipe.
• Mitigate Application Layer Attacks. 
Vendor asks to indentify whether the malicious traffic 
is generated by a tool. Specific application attacks 
might be mitigated by existing solutions. 
• Response: 
Here vendor has another hypothesis that the 
customer has intelligent solutions to handle L7 
attacks. Application layer attacks are quite complex in 
nature and require specialised solution. They cant be 
identified and treated by generic security solutions like 
firewalls and IPS. Especially when the traffic is HTTPS, 
perimeter security solutions are incapable of handling 
such attacks.
• Leverage your security perimeter 
If attacks still persist, it could be asymmetric layer 7 
ddos floods. 
• Response: 
Nothing of the above counter measures or suggestion 
were successful so it is obvious that the attacks would 
still persist in your network. But its too early to 
conclude on a specific attack type without having 
treated them at various levels.
• Constrain Resources. 
Vendor asks to rate-Limit all traffic. 
• Response: 
This is a severe concern and might be risk to revenue. 
If couple of genuine transactions get dropped in an 
attempt to block the attack traffic, there is high 
possibility of the consumer landing on to competitor 
business and thus you loosing the revenue. Rate-limit 
is good technique to manage QoS for out going traffic, 
but its very risky if using this for incoming traffic.
• Thus overall, the steps suggested in form of a white paper are 
completely helpless to a customer under attack. 
• There are various assumptions and hypothesis as indicated at 
relevant points, there seems lack of experience in handling 
such live scenarios under attack. 
• For any customer/business, the right time to be prepared to 
handle DDOS attacks is “NOW”. 
• Businesses has to be proactive in nature and should 
acknowledge that DDOS is a crucial factor if they are existing 
on internet. 
• Risk management documents should indentify DDoS as a 
crucial risk element. 
• There must be proactive measures and a competent response 
team to handle such attack patterns.
References 
http://docs.media.bitpipe.com/io_11x/io_113276/item_826799/ddos-infographic.pdf

More Related Content

PPTX
PACE-IT: Common Threats (part 2)
PDF
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
PDF
Automatic DDoS Attack Simulator | MazeBolt Technologies
PPTX
PACE-IT: Risk and Security Related Concepts
PPT
Damballa automated breach defense june 2014
PDF
The Expanding Role and Importance of Application Delivery Controllers [Resear...
PDF
Network DDoS Incident Response Cheat Sheet (by SANS)
PACE-IT: Common Threats (part 2)
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
Automatic DDoS Attack Simulator | MazeBolt Technologies
PACE-IT: Risk and Security Related Concepts
Damballa automated breach defense june 2014
The Expanding Role and Importance of Application Delivery Controllers [Resear...
Network DDoS Incident Response Cheat Sheet (by SANS)

What's hot (20)

PDF
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
PPTX
PACE-IT: Network Access Control
PPTX
DamballaOverview
PPT
Info Sec2007 End Point Final
PDF
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
PPT
Malware Incident Response
PPTX
Employee security awareness communication
PPTX
PACE-IT: Common Threats (part 1)
PDF
DataShepherd Security
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT: Physical Network Security Control
PPTX
Chris Haley - Understanding Attackers' Use of Covert Communications
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
PPTX
Harry Regan - It's Never So Bad That It Can't Get Worse
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
Incident Response in the age of Nation State Cyber Attacks
PPTX
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
PPTX
PACE-IT: Common Network Security Issues
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
PACE-IT: Network Access Control
DamballaOverview
Info Sec2007 End Point Final
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
Malware Incident Response
Employee security awareness communication
PACE-IT: Common Threats (part 1)
DataShepherd Security
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT: Basic Forensic Concepts
PACE-IT: Physical Network Security Control
Chris Haley - Understanding Attackers' Use of Covert Communications
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Harry Regan - It's Never So Bad That It Can't Get Worse
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Incident Response in the age of Nation State Cyber Attacks
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
PACE-IT: Common Network Security Issues
Ad

Viewers also liked (8)

PPT
10 Most Common DDo S Attacks
PDF
Preparing for the Imminent Terabit DDoS Attack
PDF
DDoS Attack Detection & Mitigation in SDN
PPTX
Denial of service attack
PPTX
DoS or DDoS attack
PPT
DDoS Attacks
PDF
Denial of Service Attacks
PPT
10 DDoS Mitigation Techniques
10 Most Common DDo S Attacks
Preparing for the Imminent Terabit DDoS Attack
DDoS Attack Detection & Mitigation in SDN
Denial of service attack
DoS or DDoS attack
DDoS Attacks
Denial of Service Attacks
10 DDoS Mitigation Techniques
Ad

Similar to Responses to "10 step's to mitigate ddo s attacks" (20)

PDF
9 Steps For Fighting Against a DDos Attack in real-time
PPTX
2012 Global Application and Network Security Report
PPTX
Study of System Attacks- DoS.pptx
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
PDF
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
PDF
Web Attack Survival Guide
PDF
DDoS mitigation EPIC FAIL collection - 32C3
PPTX
Defending Enterprise IT - beating assymetricality
PDF
comparing-approaches-for-web-dns-infrastructure-security-white-paper
PDF
A10 issa d do s 5-2014
PDF
DDoS Mitigation Techniques for Your Enterprise IT Network
PPTX
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
PDF
Akamai___WebSecurity_eBook_Final
PDF
Irm 4-ddos
PDF
Cloudy Wpcybersecurity
PDF
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
PDF
The role of DDoS Providers
PPTX
Denial Of Service Attacks (1)
PDF
Detecting DDoS Attacks: 8 Key Warning Signs for Enterprises
9 Steps For Fighting Against a DDos Attack in real-time
2012 Global Application and Network Security Report
Study of System Attacks- DoS.pptx
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
DSS ITSEC 2013 Conference 07.11.2013 - Radware - Cyber Attacks Survival Guide
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
Web Attack Survival Guide
DDoS mitigation EPIC FAIL collection - 32C3
Defending Enterprise IT - beating assymetricality
comparing-approaches-for-web-dns-infrastructure-security-white-paper
A10 issa d do s 5-2014
DDoS Mitigation Techniques for Your Enterprise IT Network
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
Akamai___WebSecurity_eBook_Final
Irm 4-ddos
Cloudy Wpcybersecurity
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
The role of DDoS Providers
Denial Of Service Attacks (1)
Detecting DDoS Attacks: 8 Key Warning Signs for Enterprises

Recently uploaded (20)

PPTX
TLE Review Electricity (Electricity).pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
STKI Israel Market Study 2025 version august
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
TLE Review Electricity (Electricity).pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Tartificialntelligence_presentation.pptx
Getting Started with Data Integration: FME Form 101
cloud_computing_Infrastucture_as_cloud_p
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Module 1.ppt Iot fundamentals and Architecture
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Hindi spoken digit analysis for native and non-native speakers
OMC Textile Division Presentation 2021.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Getting started with AI Agents and Multi-Agent Systems
STKI Israel Market Study 2025 version august
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Web App vs Mobile App What Should You Build First.pdf
Developing a website for English-speaking practice to English as a foreign la...
Group 1 Presentation -Planning and Decision Making .pptx

Responses to "10 step's to mitigate ddo s attacks"

  • 1. Responses to 10 Steps in Mitigating DDoS Attacks in Real Time B V S Narayana CISSP, CISA @bvsnarayana03 layer4to7.wordpress.com
  • 2. • Very recently a white paper was released by one of the IT vendor, on how to deal with a DDoS attack when they are struck with it. The document highlights 10 key factors, which they claim are the measures to be taken during the attack. But the document mostly deals with certain hypothesis and mostly approaches which are reactive in nature. • Next few slides highlight why these steps might not be helpful during DDoS crisis.
  • 3. • Verify that there is an attack. Rule out common causes of an outage, such as DNS mis-configurations, upstream routing issues, and human error. • Response: This indicates that one should wait till they are attacked and not take any proactive measures to handle the attacks or mitigate them. This also hints at human intervention and decision to decide whether they are under attack or not. In such a scenario, one could most probably take a guess on the nature of traffic only if there is a spike. Otherwise, for any attacks which are taking place at normal traffic pattern are sure will be ignored. This puts any network at high risk.
  • 4. • Contact your Team Leads. Here the vendor mentions that the network and application leads must be immediately contacted to verify the areas being attacked and to confirm the attack and areas affected. • Response: This is a tedious task and absolutely not sure if there would be a common affirmation for such case. On any normal day of business operation if the user complaints of slowness in application, both teams safeguard themselves and passes the blame on to the other team. Application team puts the cause of slowness on network and vice versa. How then under an attack scenario, one can expect the two teams to be cohesive and confirm whether or not its an attack and if it is, then confirm the magnitude.
  • 5. • Triage your applications. The vendor mentions that during DDoS attack, focus should be on protecting the critical apps / revenue generators. Response: Now such decisions are a part of BCP/DR plan and the strategy is clearly defined on which apps are critical, when should the DR be invoked, what should be the RTO and RPO for such applications. One doesn’t decide about a critical application and the strategy to keep it live when struck by an attack. When under attack, you may affected at internet/mpls pipes, network devices like firewals, IPS, load balancer might be impacted, server infra might be hampered or the applications might be siffering. So irrespective of the strategy you have, even if you have good BCP in place, how do you ensure that the attack doesn’t reach your 2nd or 3rd DC or DR from where you host the business critical apps.
  • 6. • Protect remote Users. Vendor asks to maintain White-List IP addresses and asks to propagate it across the network devices even up to the ISP. • Response: While internet is shrinking the world and businesses are striving to be available globally today, how easy it is for any organisation to know whether the genuine user should be hitting the application from US, UK, India etc. It is completely un-realistic and also not expected of the business to know the IP pool from where the users would access the application. Business in present era is all about being available to everyone from everywhere at all times. White-listing approach is not a fit and completely out of question to handle ddos.
  • 7. • Classify the Attack. Whether the attack is Volumetric, Slow, Low? Service Provider must have already taken remediation steps. • Response: Here the hypothesis is that the customer is already subscribed to a mitigation service from ISP. Even bigger hypothesis is that the ISP is equipped to handle all types of DDoS attacks and is capable of identifying and mitigating them in real-time. If the hypothesis is correct and for assumption the ISP has really handled the attack, then what is the white paper published for? Customer if at all they are relying on the ISP, must understand what capabilities are built in his cloud to identify and mitigate various DDoS flavours. Whether the ISP is offering any SLA’s for availability, is there a level of transparency with customer on when the attack started, when it ended, actions taken, is there a portal for access to customer in real-time, whether the ISP is willing to sign a penalty clause in case attacks get leaked and reach to customer network.
  • 8. • Evaluate Source address mitigation options. Vendor asks to identify the source of attacks and block the at firewall. Response: Gone are the days of DDoS attacks which emerged from a single source. Now with sophisticated tools and the reach of internet, attacks can be launched from anywhere from any no. of source IP’s, spoofed addresses, attacks might be coming from proxies or CDNs (which also carry legitimate traffic). How do you keep a track of the IPs in such scenario. Even if the IPs are tracked and ACL are applied at firewall or at perimeter routers, the attack has still reached those devices and might result in exhausting their resources or choking the entire service provider pipe.
  • 9. • Mitigate Application Layer Attacks. Vendor asks to indentify whether the malicious traffic is generated by a tool. Specific application attacks might be mitigated by existing solutions. • Response: Here vendor has another hypothesis that the customer has intelligent solutions to handle L7 attacks. Application layer attacks are quite complex in nature and require specialised solution. They cant be identified and treated by generic security solutions like firewalls and IPS. Especially when the traffic is HTTPS, perimeter security solutions are incapable of handling such attacks.
  • 10. • Leverage your security perimeter If attacks still persist, it could be asymmetric layer 7 ddos floods. • Response: Nothing of the above counter measures or suggestion were successful so it is obvious that the attacks would still persist in your network. But its too early to conclude on a specific attack type without having treated them at various levels.
  • 11. • Constrain Resources. Vendor asks to rate-Limit all traffic. • Response: This is a severe concern and might be risk to revenue. If couple of genuine transactions get dropped in an attempt to block the attack traffic, there is high possibility of the consumer landing on to competitor business and thus you loosing the revenue. Rate-limit is good technique to manage QoS for out going traffic, but its very risky if using this for incoming traffic.
  • 12. • Thus overall, the steps suggested in form of a white paper are completely helpless to a customer under attack. • There are various assumptions and hypothesis as indicated at relevant points, there seems lack of experience in handling such live scenarios under attack. • For any customer/business, the right time to be prepared to handle DDOS attacks is “NOW”. • Businesses has to be proactive in nature and should acknowledge that DDOS is a crucial factor if they are existing on internet. • Risk management documents should indentify DDoS as a crucial risk element. • There must be proactive measures and a competent response team to handle such attack patterns.