Guide to Internet Routing

Comments · 245 Views

It may sound like a term from astrophysics, but in the world of technology, it refers to a disturbing practice that can have serious consequences.

To defend against such attacks, ISPs employ blackholing techniques. When a DDoS attack is detected, the network operator uses the Border Gateway Protocol (BGP) blackhole feature to discard the traffic destined for the attacked IP addresses. This effectively steers the attack traffic into a “black hole,” preventing it from reaching its intended target.

Blackholing serves as an effective technique because it allows ISPs to quickly and efficiently mitigate the effects of DDoS attacks. By discarding traffic at the network edge, blackholing reduces the performance impact on the network infrastructure and allows legitimate traffic to flow smoothly.

More info: What is a ransomware attack?

Comments
Free Download Share Your Social Apps