Distributed Denial of Service (DDoS) Protection

(Timezone - Europe/Amsterdam)



Distributed Denial of Service (DDoS) attacks have been the scourge of the internet over the past 20 years. Although the media attention has waned, they continue to evolve and grow in power, with botnet clients becoming easier to deploy and ever more services being exploited as multipliers for packet floods.

This course will take the participants from an overview of DDoS through details of the most common attacks and concludes with ways to detect and mitigate them

Please note that there is one registration - once registered you are welcome to attend all or selected sessions.

Also please note that we shall send you a calendar invitation with the Zoom link closer to the date of the session.

If you have registered less than an hour before the start of a session please email glad@geant.org to let us know and we shall forward you joining instructions.

Each session will be recorded; we shall notify all the participants how to access recorded sessions once recordings become available.

Registration for this event is now closed (as of 15/02/21). If you would like to attend sessions on 15 and/or 17 February 2021 please get in touch with glad@geant.org

We look forward to seeing you (virtually) soon.

Glad Team (GEANT Learning and Development)
    • 1
      Introduction to DDoS Attacks

      "Introduction to DDoS Attacks - An overview of motivation and modus operandi of attackers"
      DDoS attacks have been around for more than 20 years now, and over this time, they have gained in power, reaching now several terrabits in bandwidth, enough to knock of ISPs. While the actual DDoS attacks have changed very little, the orchestration of the attacks, the deployment of their components and the motives of attackers have evolved.

      This course will give the participants an overview of the attacks and the attackers, their motivation and modus operandi.

    • 2
      Details of selected DDoS Attacks - How the attacks work from a technical perspective

      While DDoS attacks have become more powerful and easier to start for attackers, the technical details of DDoS attacks have been remarkably consistent over the last 20 years.

      This course will provide the participants with an in-depth view of the technical details of the most common DDoS mechanisms: amplification and reflection and the services being exploited for them.

    • 3
      "DDoS Detection - How to know if you are under attack or partake in an attack"

      The questions of how DDoS Detection works sounds simple: when your can't access your systems, you're under attack. But this may also happen due to technical problems and misconfigurations. And what if you want to detect attacks without being a victim of one?

      The course will show participants the various ways of how DDoS attacks are detected on the Internet.

    • 4
      DDoS Mitigation

      Mitigating a DDoS attack, especially the bigger ones, seems a daunting task, especially so with a determined attacker and when other sites are also affected.

      This course will show some simple, but proven techniques to combat DDoS attacks and also to avoid unintentionally partaking in one.