Application layer DDoS mitigation in action

Layer 7 DDoS attack

Figure 1. L7 DDoS attack profile over an 18-hour period.

Attack source

Figure 2. L7 DDoS attack source locations.

Target endpoints

Figure 3. HTTP method and URL targets.

Edgecast HTTP Rate Limiting mitigates Layer 7 DDoS attacks

Figure 4. Distribution of attack across PoPs.
Figure 5. The Edgecast CDN global network
  • “Despite an eighteen-hour cyber attack with peak requests greater than 150,000 per second, we were able to maintain business continuity for Logitravel, servicing more than 3,300 requests per second of legitimate traffic across 50 websites worldwide. Without Verizon and their Application Layer DDoS security feature, Logitravel would have experienced a catastrophic loss of customers, revenue and brand reputation.”
  • –Iñaki Fuentes CEO, Bluekiri
    Platform services provider to Logitravel, Smyrooms, Roomdi, and numerous other high-traffic websites

--

--

--

Formerly Verizon Media Platform, Edgecast enables companies to deliver high performance, secure digital experiences at scale worldwide. https://edgecast.com/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

TCW Token burn automatically

InfoSecSherpa’s News Roundup for Tuesday, August 31, 2021

Irked | HTB | OSCP | Box 6

Cybersecurity firm Cygilant infected with ransomware

How To Prevent Yourself From Becoming A Victim Of Banking SMiShing Scams

WIFI(Wireless) Password Security

Curve Card Services Disrupted Due to Wirecard’s Suspended License

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Edgecast

Edgecast

Formerly Verizon Media Platform, Edgecast enables companies to deliver high performance, secure digital experiences at scale worldwide. https://edgecast.com/

More from Medium

Security and Privacy at the Edge of Internet of Things

An Investigation into Obfuscation

Smart greenhouse, patient monitor and more — Learnings in IoT from a software engineering leader

Pratically speaking: SSI for IoT Sensors

There are three parties involved: Issuer, Holder and Verifier