Distributed Denial of Service (DDoS): Protection & Mitigation
As the saying goes, an ounce of prevention is worth a pound of cure. There are some best practices that service providers should take into account to protect themselves from a DDoS attack, which can impact their network, as well as the service they provide to their customers.
In this second video in our two-part series on DDoS, I discuss with Paul Dragin from A10 Networks some of the ways you can detect and mitigate a DDoS attack. You'll learn what's most important to consider when choosing and evaluating DDoS protection and mitigation — which should be a solution that is precise, automatic, scalable and affordable — giving you the confidence that you need to protect your network and customers.
If you missed part one on the different types of DDoS attacks and why they are launched, you can watch it here.
To find out more about what operators should consider before making additional DDoS investments, you can request this free white paper.
About the Author: Rick Yuzzi

Never miss a post.
Enter your email to subscribe:
- Blog (13)
- Ask an Expert (12)
- Technology (12)
- Hot Topics (9)
- ask a broadband expert (8)
- DOCSIS (7)
- PNM (5)
- proactive network maintenance (5)
- Customer Service (4)
- Industry Perspectives (4)
- interview (4)
- DDoS Attacks (3)
- Distributed Denial of Service Attacks (3)
- PreEqualization Analyzer (3)
- correlation groups (3)
- 5G (2)
- Codeword Errors (2)
- DOCSIS 3.1 (2)
- DOCSIS pre-equalization (2)
- Diagnostics (2)
- Distributed Access Architecture (2)
- FCC (2)
- GPoN (2)
- IPv6 migration (2)
- Marketing (2)
- Millimeter Wave (2)
- Voice Service (2)
- mid-band spectrum (2)
- mmWave (2)
- network virtualization (2)
- 10G (1)
- C-Band (1)
- CAF II Requirements (1)
- CAF II Testing (1)
- CBRS (1)
- CGNAT (1)
- Carrier Grade NAT (1)
- Citizens Broadband Radio (1)
- Connect America Fund (1)
- DAA (1)
- DOCSIS 4.0 (1)
- DPoE (1)
- DPoG (1)
- EPoN (1)
- Extended Spectrum DOCSIS (1)
- FTTH (1)
- FTTx (1)
- Fidelity Communications (1)
- Full Duplex (1)
- Group Delay (1)
- Hosted VoIP (1)
- ICFR (1)
- IP traffic (1)
- IPv4 (1)
- IPv4 Conservation (1)
- IPv6 (1)
- IPv6 Transition Plan (1)
- In Channel Frequency Response (1)
- LTE (1)
- Low Latency DOCSIS (1)
- MAC/PHY (1)
- Main Tap Compression (1)
- Micro Reflections (1)
- Mobile (1)
- Monitoring (1)
- Motivation for DDoS Attacks (1)
- NG-PON2 (1)
- NetFlow (1)
- Network Traffic Management, (1)
- Preventing DDoS attacks (1)
- Private Access License (PAL) (1)
- Purchase IPv4 Addresses (1)
- RDOF Auction (1)
- RDOF Voice Requirements (1)
- Remote MAC/PHY (1)
- Remote PHY (1)
- Robocalls (1)
- Rural Broadband (1)
- Rural Digital Opportunity Fund (1)
- STIR/SHAKEN (1)
- Small Cells (1)
- TV Viewership Analytics (1)
- TWDM-PON (1)
- TruVizion (1)
- Types of DDoS Attacks (1)
- Upstream Analyzer (1)
- Videos (1)
- VoIP (1)
- VoIP revenue (1)
- Wired Broadband (1)
- XGS-PON (1)
- cableLabs (1)
- caf ii (1)
- case study (1)
- cloud-based VoIP (1)
- commercial VoIP (1)
- commercial VoIP revenue (1)
- cpe spectrum capture (1)
- customer service (1)
- customer service tip (1)
- dhcp (1)
- downstream spectrum issues (1)
- dynamic spectrum sharing (1)
- fiber optics (1)
- forward path monitoring (1)
- free download (1)
- full band capture (1)
- ingress (1)
- net neutrality (1)
- network traffic (1)
- pppoa (1)
- pppoe (1)
- pre-equalization (1)
- remote spectrum analyzer (1)
- return path (1)
- scott helms (1)
- technical paper (1)
- traffic scrubbing (1)
- vTDR (1)
.
About the Blog
Bloggers
Comments Policy
Guest Blogging
Privacy Policy
Leave a comment: