URL has been copied successfully!
Smarter DDoS security at scale
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Block first, ask questions later: One way to minimize the impact of encrypted attack traffic is to simply drop it before decrypting. There are several methods we employ to filter out the garbage quickly and efficiently:
Known source blocking: Many attackers are now using open internet proxies to hide the source of their HTTPS attacks. We constantly track these sources, and our ATLAS Intelligence Feed (AIF)-powered countermeasure can block them automatically.TLS attack prevention: This countermeasure looks at the TLS handshake (pre-encryption) and can block TLS sessions that don’t follow standard user behaviors”‹.TCP connection limiting: This countermeasure looks at TCP connection behavior from each source. Sources opening too many connections or engaging in abusive behaviors over TCP can be blocked.Rate-based protections: Usually, attackers will be sending more traffic than legitimate users, and these protections can distinguish and block those sources automatically”‹.Selective decryption: This is used to decrypt and deal with more-advanced attacks, when encrypted traffic behavior mimics legitimate users. Why full decryption isn’t always the answer: Decrypting all traffic isn’t practical. It’s computationally expensive and can quickly exhaust system resources. What’s needed is a smarter approach”, one that focuses decryption efforts only where it’s truly necessary. NETSCOUT’s solution: Selective decryption: NETSCOUT’s Arbor Edge Defense (AED) offers a powerful solution via selective decryption. Positioned at the network edge, AED intelligently decides which traffic to decrypt based on threat indicators and client validation.Here’s how it works:
Intelligent decryption: As the traffic enters, AED identifies valid client traffic and passes it on without requiring decryption.Suspicious traffic decryption: Only non-validated encrypted traffic is decrypted and analyzed for DDoS threats.Customizable decryption: Users can enable decryption for specific protection groups or levels, allowing targeted inspection without wasting resources.

<img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?quality=50&strip=all&w=1024" alt="Smart DDOS graph" class="wp-image-4117460" srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?quality=50&strip=all 4592w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=300%2C150&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=768%2C385&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=1024%2C513&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=1536%2C769&quality=50&strip=all 1536w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=2048%2C1026&quality=50&strip=all 2048w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=1240%2C621&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=150%2C75&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=854%2C428&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=640%2C321&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2026/01/Graph_Smarter-DDoS-1.jpg?resize=444%2C222&quality=50&strip=all 444w” width=”1024″ height=”513″ sizes=”auto, (max-width: 1024px) 100vw, 1024px” />

NETSCOUT Benefits of selection decryption: Efficient resource use: Focuses decryption on suspicious traffic, preserving system performanceScalable protection: Enables high-scale defense against encrypted threats without compromising throughputFlexible configuration: Tailors decryption policies to match the needs of different services and threat levels Conclusion: As encrypted traffic continues to grow, so does the need for smarter security solutions. NETSCOUT AED’s selective decryption approach empowers organizations to defend against encrypted DDoS attacks efficiently and effectively”, without sacrificing performance.  Learn more about Arbor Edge Defense.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/4117454/smarter-ddos-security-at-scale.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link