A distributed denial of service attack attempts to overwhelm and exhaust an application's resources, making the application slow or unresponsive to legitimate users. DDoS attacks can target any resource that's publicly reachable through the internet, including websites.
DDoS Protection identifies the attacker's attempt to overwhelm the network and blocks further traffic from them, ensuring that traffic never reaches the resources. Legitimate traffic from customers still flows in without any interruption of service.
DDoS Protection can also help you manage your cloud consumption. When you run on-premises, you have a fixed number of compute resources. But in the cloud, elastic computing means that you can automatically scale out your deployment to meet demand. A cleverly designed DDoS attack can cause you to increase your resource allocation, which incurs unneeded expense.
DDoS protection may help you prevent:
Volumetric attacks- The goal of this attack is to flood the network layer with a substantial amount of seemingly legitimate traffic.
Protocol attacks- These attacks render a target inaccessible by exploiting a weakness in the layer 3 and layer 4 protocol stack.
Resource-layer (application-layer) attacks- (only with web application firewall) These attacks target web application packets to disrupt the transmission of data between hosts. You need a web application firewall (WAF) to protect against L7 attacks.
https://www.skillpipe.com/#/reader/urn:uuid:cd0c80a0-b0ef-59e9-bebd-7334e2f12cb8@2022-02-25T04:46:05Z/content