SHARE
Facebook X Pinterest WhatsApp

Leverage the Cloud as Attack Traffic Defense Mechanism

thumbnail Leverage the Cloud as Attack Traffic Defense Mechanism

Denial-of-service (DoS) attacks on government web sites are becoming bigger in scale and more frequent these days. According to FutureGov, leveraging the cloud as a defense mechanism becomes your first layer of defense. Servers distributed across the entire Internet and traffic from a particular part of the world will be routed from a particular server […]

Feb 24, 2010
Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Denial-of-service (DoS) attacks on government web sites are becoming bigger in scale and more frequent these days. According to FutureGov, leveraging the cloud as a defense mechanism becomes your first layer of defense. Servers distributed across the entire Internet and traffic from a particular part of the world will be routed from a particular server before it reaches the actual address of the web site.


“‘This distributed server network then becomes your first layer of defense, which can absorb or black hole the traffic, or simply send it back to where it comes from,’ Lim explains. The decision as well as what tools to employ should be in the Standard Operating Procedure (SOP) – the guidelines a particular government or agency follows when attacked.

“‘The person who first sees the alert of abnormal traffic is probably not a decision maker,’ Lim elaborates. ‘Therefore a proper escalation mechanism needs to be in place by which depending on the severity of attacks, different levels of decision makers are informed immediately to decide how to respond.’

“For example, if an agency’s infrastructure is distributed and resilient enough that it is capable to absorb the traffic coming in without being compromised; it might make a decision to absorb the traffic such the attacks are not directed to another agency or organization which might not be able to sustain them.”

Read the Full Story at FutureGov

Recommended for you...

4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Examples of Ransomware: A Cautionary Tale
Juniper, Cato Build Out SASE Platform Offerings
Jeff Burt
Feb 4, 2022
Pandemic Leads to Permanent Changes in Workforce, WAN: Aryaka
Jeff Burt
Jan 20, 2022
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.