Photo

DDoS, bad bots and hacking attempts: why different protection?

Edgar Mikayelyan

from Qrator Labs (Prague)

About speaker

Head of a Presales Team, Qrator Labs. Graduate of the Yerevan State University Faculty of Mechanics. Responsible for design and implementation of technically complex projects to ensure continuous availability of Internet services for customers and partners.

About speakers company

Qrator Labs is an acknowledged expert in Continuous Network Availability offering various Network security services to ensure safe Internet and continuous DDoS mitigation for businesses worldwide. Qrator Labs unique anycast architecture provides a reliable geo-distributed, low latency web app protection platform across the North and South America, Europe, Middle East and Asia with filtering bandwidth capacity more than 4 000 Gbps and 15 points of presence worldwide.

Abstracts

broad

1. Introduction:
- Overview of Application Layer (L7) DDoS attacks, unwanted bot activity, and hacking attempts.
- Significance of securing the Application Layer in digital environments.
2. Application (L7) DDoS Attacks:
- Explanation of L7 DDoS attacks and their impact on application availability.
- Analysis of the distinct challenges posed by Application Layer attacks.
- Examples of Application (L7) DDoS Attacks.
3. Unwanted Bot Activity:
- Identification of unwanted bot behavior and its implications for online platforms.
- Examples of main unwanted bot activities: Scraping, Brute-force, SMS bombing, etc.
4. Hacking Attempts:
- Overview of hacking attempts targeting the application layer.
- Examples of common methods used in hacking, such as SQL injection or cross-site scripting.
5. How to counteract?
- Defending against L7 DDoS attacks.
- What to do with unwanted bot activity?
- Defensive strategies and tools to protect against hacking attempts.
6. Why Different Defences?
- Analysis of the unique characteristics of each threat (L7 DDoS, unwanted bots, hacking attempts).
- Illustration of why a tailored, multi-layered defence is crucial for comprehensive protection.
7. Conclusion:
- Emphasis on the need for specialised defences in the Application Layer.
- Justification for a diverse approach considering the distinct nature of each threat.
- Reflection on the evolving landscape and the importance of adaptive defence strategies.
8. Q&A

The Program Committee has not yet taken a decision on this talk

other talks of this topic