What are the recent DoS/DDoS attack trends and how IG 200/2000 protect against the evolving threats?
Unfortunately, Dos/DDoS have become very common these days. I have recently found a clear strategy to prevent any website from hack attacks including dos/ddos http://v-sys.org/services/ddos_protection/remote_site_protection .
In earlier days (a few years back), most attacks used to be spoofed and we do a great job in preventing spoofed floods through SYN, ICMP, UDP flood prevention etc. through SYN cookies and other mechanisms. These days we are seeing a lot of attacks which come from Botnets and limited IPs. We do an excellent job of stopping these attacks through our patent pending source tracking mechanisms which punish attackers and limit number of packets/source, connections/source, etc. When we identify the sources, we block them for a longer time and inform the administrator of the IP addresses. Here is the trendline of attacks: SYN Flood: Spoofed IP addresses fill the connection table. 3-way handshakes were not completed. IntruGuard Solution: Legitimate IP address Table, Antispoofing Module, Dark-address prevention Zombie Flood: Non-spoofed IP addressees fill the connection table. 3-way handshakes were completed. IntruGuard Solution: Give preference to already established connection. Rate-limit new