1 00:00:00,470 --> 00:00:01,880 Actually, to be float at that. 2 00:00:03,770 --> 00:00:10,730 What is an al Qaeda attack, it is a type of volumetric distributed denial of service attack designed 3 00:00:10,730 --> 00:00:17,990 to overwhelm a target server with a -- request once the target has been saturated with request and 4 00:00:17,990 --> 00:00:24,170 is unable to respond to a normal traffic denial of service would occur for additional requests from 5 00:00:24,170 --> 00:00:25,270 actual users. 6 00:00:25,820 --> 00:00:33,950 So you can see that, yeah, here is we have got one, two or three we will get or we the server here 7 00:00:33,950 --> 00:00:35,030 and here is the client. 8 00:00:35,420 --> 00:00:41,960 Here is a normal client or normal user, but here is a malicious botnet from the botnet. 9 00:00:41,960 --> 00:00:43,100 We are a malicious bot. 10 00:00:43,370 --> 00:00:48,680 So you can see we the server will receive HDB get blood from the bots. 11 00:00:48,980 --> 00:00:55,700 So when the client trying to access the server, he will not be able to access it because it is already 12 00:00:55,700 --> 00:00:55,930 over. 13 00:00:55,970 --> 00:01:01,970 Will HDTV flood attack what's actually in it is actually being looked at. 14 00:01:01,980 --> 00:01:03,680 That's our type of layer seven. 15 00:01:03,920 --> 00:01:11,540 Now the last seven is the application of the model and refers to Internet protocol such as HDB. 16 00:01:11,960 --> 00:01:19,820 Now HDB is the basis of browser based Internet request and is commonly used to load boobage to send 17 00:01:19,940 --> 00:01:21,740 from content over the Internet. 18 00:01:22,190 --> 00:01:26,090 Mitigating application layer attacks is particularly complex. 19 00:01:26,300 --> 00:01:30,440 As the Maneesha struck, it is difficult to distinguish from normal traffic. 20 00:01:31,430 --> 00:01:38,270 Now, the types of attacks, the first one, which is actually we get the that and that should be. 21 00:01:38,890 --> 00:01:42,950 So let's start with the we get attack in this form of attack. 22 00:01:42,950 --> 00:01:49,340 Multiple computers or other devices are coordinated to send multiple requests for images, files or 23 00:01:49,340 --> 00:01:56,510 some other assist from a target terror when the target is uninitiated with incoming requests and responses, 24 00:01:56,720 --> 00:02:02,450 denial of service, when according to additional requests from legitimate sources, the other type is 25 00:02:02,450 --> 00:02:03,890 active bomb attack. 26 00:02:04,250 --> 00:02:09,860 Now, typically, when a form is submitted on our website, the server must handle the incoming request 27 00:02:09,860 --> 00:02:14,390 and push the data into a resistance level, most often a database. 28 00:02:15,080 --> 00:02:20,420 Now the process of handling the phone data and running the necessary database commands is relatively 29 00:02:20,420 --> 00:02:26,420 intensive compared to the amount of processing, power and bandwidth required to send the budget request. 30 00:02:26,750 --> 00:02:33,200 So this attack utilizes the disparity in relative resource consumption by sending many more requests 31 00:02:33,200 --> 00:02:39,880 directly to a targeted server until it is capacity is saturated and denial of service echoes. 32 00:02:41,030 --> 00:02:47,920 So how can I be blunt attack be mitigated or how to protect ourselves from such attacks? 33 00:02:48,740 --> 00:02:53,270 Mitigating layers of attacks is this actually and often multifaceted? 34 00:02:53,420 --> 00:02:59,870 One method is to implement a change to the requesting machine in order to test whether or not it is 35 00:02:59,870 --> 00:03:05,170 about much like gabacho that is commonly found when creating an account online. 36 00:03:05,360 --> 00:03:13,040 So you put the back there and make sure you are not a robot or I'm a human test right now. 37 00:03:13,040 --> 00:03:19,550 By giving requirements such as JavaScript computational challenge, many attacks can be mitigated. 38 00:03:19,850 --> 00:03:27,350 Right now this is not 100 percent, because if you have your botnet intelligence or A.I. artificial 39 00:03:27,350 --> 00:03:33,710 intelligence, maybe you can bypass this capture by Nowy, but this is will mitigate it. 40 00:03:34,730 --> 00:03:37,310 Actually, it will mitigate a lot of that decs. 41 00:03:38,790 --> 00:03:45,570 Now, other avenues for Stubing actually to be freed include the use of a Web application firewall, 42 00:03:45,660 --> 00:03:52,560 which is the Web managing and EBE reputation database in order to track and selectively block malicious 43 00:03:52,560 --> 00:03:52,980 traffic. 44 00:03:53,400 --> 00:03:56,460 And actually, this will mitigate a lot, actually. 45 00:03:56,670 --> 00:04:02,820 And this is commonly used nowadays running the wire in front of your servers. 46 00:04:02,910 --> 00:04:06,030 It will mitigate a lot of the attacks you will get.