Product News
Announcing Cloud Insights for Amazon Web Services

DDoS Protection Needs To Be Verified and Measured

DDoS attacks can severely cripple business-critical applications and bring business operations down, impacting revenues and the brand. They put large strains on companies' global networks and their upstream ISP networks. Cloud-based Distributed Denial of Service (DDoS) mitigation services or an on-site mitigation strategy are two methods employed by companies to stop or lessen these unpredictable attacks.  

Both internal and external network visibility is essential to understanding and ensuring that your user experiences are not impacted in the event your network experiences a DDoS attack. The first step in remediation is for you to continuously identify potential DDoS threats that impact your users and secondly to monitor how effective your internal mitigation or cloud-based mitigation services are performing during these attacks. ThousandEyes DDoS monitoring performs both of these DDoS attack responses and visualizes the impacts, while recording performance data that can be shared in real-time with internal IT teams or external mitigation services personnel, enabling detailed collaborative forensics.

DDoS Mitigation Service Monitoring with ThousandEyes

ThousandEyes tracks the activation of a DDoS mitigation service using DNS or BGP to detect whether traffic is being routed as expected. Using ThousandEyes, you can measure whether deployed mitigation techniques are successful and identify specific devices or scrubbing centers that affect performance.

Read the transcript

Understand DDoS Attacks

Understand DDoS Attacks From an Outside-In Visual Perspective

With ThousandEyes, network path visualization makes it possible to track a DDoS attack:

  • Quickly locate packet loss, high latency links and overloaded scrubbing centers that impact your application performance
  • Clearly track the impact of DDoS attacks to see what is being stressed: DNS, ISP networks, edge routers or an overloaded application server
  • Identify underperforming elements within your cloud mitigation provider, such as overloaded scrubbing centers or misrouted traffic
  • Easily correlate this information against baseline traffic behavior, compare time periods and save data for later forensics
Webinar

Monitoring DDoS Attacks and Mitigation

DDoS attacks are becoming more frequent and powerful, with the ability to shut down a website or, sometimes, major Internet services. Monitoring your network for potential threats allows you to be immediately notified of service interruptions and evaluate mitigation strategies.

Featured Blog Posts

Analyzing the wikipedia ddos attack
Analyzing the Wikipedia DDoS Attack
Three common types of ddos attacks
Three Common Types of DDoS Attacks

Why ThousandEyes?

Track Performance of Your DDoS Mitigation Service

Verify the traffic handoff to your mitigation service with visibility into DNS and BGP.

Monitor DDoS Attacks

By tracking DDoS attacks, get deep insight into whether the mitigation techniques being used are working.

Speed Up Resolution

Collaborate with external ISPs and mitigation providers in real time to resolve any security issues

Start Monitoring your DDoS Mitigation Service

Upgrade your browser to view our website properly.

Please download the latest version of Chrome, Firefox or Microsoft Edge.

More detail