Talk With an Expert

Spoofed IP Address Distributed Denial of Service Attacks: Defense-in-Depth

Spoofed IP Address Distributed Denial of Service Attacks: Defense-in-Depth (PDF, 1.59MB)Published: 12 Sep, 2001
Created by
Steven Bass

One challenge to businesses worldwide is to permit and even encourage desirable Internet traffic while excluding unwanted or even detrimental traffic. Over the past 18 months, there have been numerous articles, practicals, publications, and white papers written on one particular type of unwanted and detrimental Internet traffic - Distributed Denial of Service (DDoS) attacks. For the Internet community, the key to reducing and/or stopping DDoS attacks is to utilize a defense-in-depth approach without creating limitations in performance or scalability. The purpose of this paper is to look at a defense-in-depth approach to spoofed IP address DDoS attacks, including known defenses, new techniques, and recent developments.