Microsoft ends support for Internet Explorer on June 16, 2022.
We recommend using one of the browsers listed below.
Please contact your browser provider for download and installation instructions.
With the promotion of DX and digitalization in business operations, network-related security is becoming increasingly important.
In today's world, where there is a risk of malicious attacks in a variety of ways, proper knowledge of DDoS is indispensable.
However, few can visualize what exactly DDoS is when they hear the term.
In this article we will introduce DDoS. We'll also discuss DDoS monitoring and security measures.
A DDoS attack is a term used in the field of computer security.
It refers to an attack in which a large volume of communication traffic is intentionally sent toward a target server or network, with the goal of making services unavailable.
It is characterized by multiple computers attacking the target simultaneously.
The main objective of a DDoS attack is to generate a large amount of traffic to an Internet service, such as a website or online service, making it impossible for legitimate users to use the service by increasing the load on the service network.
The website will no longer function properly, which can cause economic damage, as well as lower reliability.
To avoid DDoS attacks, it is necessary to raise awareness of network security on a daily basis and take appropriate measures and management.
DDoS attacks target not only networks, but also servers, software, and a wide range of other areas, and in the unlikely event of a malicious attack, there is a risk of serious damage.
First, when looking at attacks against servers, regular updates must be performed to avoid vulnerabilities being targeted.
If vulnerabilities are identified by outside parties, they can be targeted as attack points, so care must be taken.
Monitoring of network flow is also essential to avoid unauthorized access to the network.
By monitoring traffic, any suspicious activity can be easily detected.
Detecting suspicious activity is critical to ascertaining the presence of malicious users. This makes it easier to detect an attack before it becomes serious.
However, attackers use a variety of methods to attack networks.
It is difficult to completely prevent damage from attacks with only specific countermeasures, so service administrators need to take all possible defensive measures.
NTT-CERT, a research activity of the NTT Social Information Research Laboratories, acts as the NTT Group's CSIRT (Computer Security Incident Response Team).
CSIRT is a team that responds to security incidents, including the collection and analysis of vulnerability information, response to incidents, and information sharing and collaboration with internal and external organizations.
The main goals of the team are to collect and share information to prevent cyber attacks, minimize damage from incidents that have occurred, and support the prevention of recurrence.
The article linked below introduces how NTT-CERT, which is conducted as one of the research activities of NTT Social Information Research Laboratories, faced cyber attacks.