amounts of data generated by IoT devices from ravitejafe's blog

In the 5G IoT ecosystem, the amounts of data generated by IoT devices and M2M communications will increase exponentially. Therefore, real-time processing of data streams based on big data platforms will be integral for automated decision-making. Such processing is normally executed at the edge and only then sent to the cloud to improve data quality and security

from February to September 2020, DDoS grew by half and was on average 98% higher than it was during the same period a year earlier. Furthermore, around 50 million DDoS attacks happened globally within a 12-month period.high-volume 50 Gpbs + attacks became a pressing issue for businesses lacking adequate protection.59% of the total number of attacks were multi-vector incidents, which organizations are too weak to fight against.the most long-lasting DDoS attack was 5,698 minutes. This equals to 4 days of non-stop attacking. Notably, the key issue with DDoS incidents for the telecom sector is a ripple effect an attack of such magnitude can cause.How Telcos Can Protect Against DDoS AttacksSet up robust Access control lists (ACL) – your first line of defense. Note, however, that ACL has a scaling issue. A rapid increase of temporary ACLs, built to resist a large-scale attack, can have a major performance impact on different router hardware and software, making the overall management rather challenging. Thus, it’s best to write several scripts for automatic router configuration and ACL management.Implement black hole scrubbing – a variation of the block hole filtering technique. In this case, the traffic is redirected to a different physical interface – a scrubbing center – that can weed out the good traffic from the malicious one. A number of software vendors offer such solutions.Real-time DDoS monitoring is a must. The best-of-breed tools are now powered with machine learning functionality, meaning their detection accuracy progressively increases over time.

More info: technical recruiter


Previous post     
     Next post
     Blog home

The Wall

No comments
You need to sign in to comment