No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Why security teams need to adapt a hybrid approach for DDoS defenses

May 9, 2023
in Protection
0
Why security teams need to adapt a hybrid approach for DDoS defenses



DDoS attacks rose to an all-time high in the second half of 2022, which means enterprise-level organizations must continue improving defense methods, mainly to prevent multi-vector and application-layer attacks designed to bypass traditional defenses.

Although traditional cloud-based DDoS protection products can stop large volumetric attacks, organizations should go one step further to strengthen on-premises security to mitigate attacks designed to evade cloud-only products.

We’d like security teams to consider a hybrid DDoS defense strategy that includes stateless deep packet inspection at the edge and a cloud solution to stop large volumetric attacks. While there’s no one-size-fits-all option to DDoS protection at the edge, this hybrid approach will ensure that organizations can more effectively remediate DDoS attacks now and in the future.

The need for a hybrid DDoS defense strategy

Although there are three main types of DDoS attacks – volumetric, protocol, and application-layer, attackers tend to use more than one category to maximize disruptiveness in targeted networks. Despite the limitations of traditional cloud-based applications, security teams must mitigate volumetric attacks upstream from the victim. Thus, we need to take a multi-layer or hybrid approach to DDoS protection with both on-premises and cloud components that recognize all the different types and targets of DDoS attacks.

For example, cloud applications can mitigate high-volume flood attacks targeting internet connectivity before they overwhelm local protection. Meanwhile, application layer, state exhaustion, and encrypted traffic attacks require on-premise defenses near the targeted applications or services. The product must also have intelligent communication between these two layers backed by current threat intelligence to stop dynamic, multi-vector DDoS attacks.

Another example underscoring the need for hybrid DDoS defenses is in a protocol attack. SYN floods are a common type of protocol attacks. In a SYN flood attack, the nefarious agent can target any system connected to the internet and deliver transmission control protocol (TCP) services. This type of DDoS attack can take down even high-capacity devices capable of maintaining millions of connections.

Finally, application-layer DDoS attacks are quite insidious, as the attacks are designed to attack the application itself, focusing on specific vulnerabilities or issues, resulting in the application not being able to deliver content to the user. Application layer attacks are designed to attack specific applications, the most common being web servers, but can include any application such SIP voice services and BGP.

Ultimately, this trifecta of DDoS attacks plainly shows how today’s DDoS attack methodologies require a multi-faceted, stateless approach that lets users look across both internet infrastructure and network availability. To protect network devices, firewalls and VPNs, the product needs to sit in front of the edge of the network to see the attack traffic before it becomes an issue. Additionally, the hybrid defense strategy at the edge needs to include advanced, stateless, deep packet inspection (DPI) tools that enable pervasive network visibility and analytics to quickly identify and respond to cyberthreats.

The increasing complexity of attacks — and how to detect and mitigate them — not only reinforces the need for a multilayer hybrid defense strategy, but it makes it a requirement.

The case for a hybrid approach

A hybrid security strategy combines an on-premises, detection and mitigation system with on-demand cloud-based mitigation capabilities at the edge. Because of the increased tenacity of cybercriminals and the growth in complexity of DDoS attacks, the foundation for a comprehensive DDoS protection strategy should begin with an on-premises, always-on, purpose-built DDoS attack mitigation option. That particular product must automatically identify and stop all types of DDoS attacks and other cyber threats before impacting the availability of business-critical services. 

Although traditional cloud-based DDoS protection products, including those provided by ISPs or CDNs, are designed to stop large volumetric DDoS attacks, they struggle to remove other types of DDoS attacks designed to evade their efforts. But security pros should not discard cloud-based mitigation solutions, as they enhance the protection of on-premises options. Ultimately, it’s best to use both an on-premises and a cloud product with intelligent and automated integration for the most comprehensive protection. Taking this approach helps ensure that an organization can thwart new and evolving DDoS attacks in real-time.

As DDoS attackers get smarter and attacks become harder to detect, organizations need a more comprehensive defense strategy to secure their network edges. While cost-effective, cloud-based options ultimately need to do more to mitigate the rapidly changing nature and types of new DDoS attacks. With a multi-layer, hybrid approach of deploying on-premises defense at the edge and a cloud-based backup, organizations can maintain better cyber hygiene and prevent extended server downtime.

Gary Sockrider, director of security solutions, Netscout

Editorial Team

Editorial Team

Related Posts

The TCL QM5K Was Already Affordable, and Now It's an Extra $450 Off
Protection

The TCL QM5K Was Already Affordable, and Now It’s an Extra $450 Off

February 5, 2026
What to Do If Your Car Icon Disappears From Google Maps in Android Auto
Protection

What to Do If Your Car Icon Disappears From Google Maps in Android Auto

February 5, 2026
Apple's 'Lockdown Mode' Could Stop the Government From Breaking Into Your iPhone
Protection

Apple’s ‘Lockdown Mode’ Could Stop the Government From Breaking Into Your iPhone

February 5, 2026
Redditors Have Figured Out a Way to Save Hundreds on a Whoop Subscription
Protection

Redditors Have Figured Out a Way to Save Hundreds on a Whoop Subscription

February 5, 2026
This Owala Water Bottle Is My Health Upgrade of the Week
Protection

This Owala Water Bottle Is My Health Upgrade of the Week

February 5, 2026
Lifehacker Logo
Protection

Deals | Lifehacker

February 5, 2026
Load More
Next Post
Ryanair to buy up to $40bn worth of Boeing aircraft and create 10,000 jobs

Ryanair to buy up to $40bn worth of Boeing aircraft and create 10,000 jobs

Popular News

  • Monarch is a budgeting app that makes it easy for couples to track shared expenses, create flexible budgets, and set joint financial goals — all without spreadsheets. Here's what it was like to use it for a month.

    I Used Monarch Money for 30 Days: Here’s What Happened

    0 shares
    Share 0 Tweet 0
  • Hargreaves Lansdown hits 2m clients and record AUA

    0 shares
    Share 0 Tweet 0
  • My brother, a corporate lawyer, refuses to sell our family’s $175K lake house. Do I push the issue and risk ruining our relationship?

    0 shares
    Share 0 Tweet 0
  • As Jamie Dimon stakes his reputation, are more banks about to fall?

    0 shares
    Share 0 Tweet 0
  • Meet the billionaire with close royal ties behind Trump’s tariffs: How Scott Bessent made his name by almost bankrupting British homeowners but could now be the UK’s economic lifeline

    0 shares
    Share 0 Tweet 0

Latest News

Ethereum

Ethereum Network Activity Breaks Records Even As ETH Price Stalls

February 5, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure The Ethereum network and its price are...

The TCL QM5K Was Already Affordable, and Now It's an Extra $450 Off

The TCL QM5K Was Already Affordable, and Now It’s an Extra $450 Off

February 5, 2026
0

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of...

Bitcoin’s Chance Of Returning To $90K By March Is Slim

Bitcoin’s Chance Of Returning To $90K By March Is Slim

February 5, 2026
0

Key takeawys:Bitcoin fell below $63,000 as weak US job data and concerns over AI industry investments fueled investor risk aversion.Options...

Bulls facing a ‘make-or-break’ moment as the S&P 500 nears a line in the sand

Bulls facing a ‘make-or-break’ moment as the S&P 500 nears a line in the sand

February 5, 2026
0

Expect more downside if the benchmark index slides below 6,720.

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.