In today's rapidly growing networks, dynamically evolving threats are on the rise. Complex DoS attacks and DDoS attacks equipped with the sophisticated intelligence are clogging the networks to immobilize traffic flow, resulting in severe network degradation and meltdown.
DDoS attacks have increased over the years and are becoming a major threat to be combated. Service providers and large-scale network deployments are struggling to find comprehensive solutions to mitigate DDoS attacks.
At the same time, the trend has also shifted and evolved from reactive detection to a more proactive detection and prevention approach that uses anomaly-based and behavioral-based systems.
The Cisco Anomaly Detection and Mitigation solution is the answer to these concerns, providing a self-defending preventive solution to detect and mitigate complex and sophisticated DoS and DDoS attacks and day-zero attacks.
The chapter gave details of the Cisco Anomaly Detection and Mitigation solution and provided core concepts of the anomaly architecture and how it works with the aid of various illustrations and diagrams.
The chapter provided a brief overview of configuring and managing the Cisco Traffic Anomaly Detector and Cisco Guard Mitigation devices through use of various sample configurations.
The chapter described and explained the important aspects of configuring Zones, Filters, Policies, and Learning Process parameters, as well as how to activate the Anomaly Detection and the Guard system.