O years , the size of distributed denialof-service ( DDoS ) attacks doubled , and the number and combination of attack vectors increased significantly . In 2020 , an 809 million packets per second ( Mpps ) attack hit an organization , making the event the largest packet per second attack ever recorded . While some organizations may believe they ’ re low-risk targets for a DDoS attack , business-critical services and applications in every industry are rich targets , and leave every business exposed to downtime and diminished performance if infrastructure isn ’ t protected .
DDoS protection must be a key tenet of your overall security strategy , so being aware of the myths can be critical to your DDoS defensive posture
Myth 1 . Total capacity indicates available mitigation resources
A simple network capacity number leaves out important details . Questions that need to be answered include : How much network capacity is dedicated for consuming attack traffic ? How many of the mitigation system ’ s resources are dedicated to stopping attacks ? How many of the network and system resources are available to deliver clean traffic to all customer origins on that platform ? And capacity isn ’ t just limited to technology . At some point , if technologies are not working effectively or optimizing mitigation , what dedicated human capacity can be leveraged for escalations , handling incident response and fine-tuning mitigation ?
Tip : Look deeper into differences between a provider ’ s total network capacity and platform stability , capacity available for attack mitigation , and clean traffic delivery utilization . u