When dealing with a small data center outsourcing provider, it is unlikely that the company can take adequate steps...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
against DDoS attacks.
Null routing, which drops communications from a specific IP address, needs to operate as close to the source of the attack as possible. If the null route table is on the provider's premises and the distributed denial of service (DDoS) attack continues, then the network traffic will still be taking up their bandwidth on the wide-area network (WAN), although it should relieve any "noisy neighbor" in-premise problems.
The problem for a small data center company is in providing any advanced DDoS attack mitigation -- a large multi-tenant hosting or colocation provider will generally have redundant networks, enabling attacks to be hived off onto one WAN connection while other traffic continues over unaffected lines. There are also software and appliance-based offerings from the likes of Neustar. Other options include protection as a service approaches from content delivery network providers, such as CD Networks and Akamai.
In your case where neighboring attacks are creating issues for your IT deployment, DDoS mitigation as a service may be the best approach.
Editor's note: Distributed denial of service attack mitigation as a service reroutes attacks from the network edge to the service provider's resources in cloud data centers. Vendors such as CloudFlare offer mitigation as a service for DDoS attacks at network layers 3, 4 and 7, and for new DDoS attack strategies such as slow read.
Should you keep DDoS mitigation on-premises?
Protect yourself from DDoS attacks
Modern DDoS attack tactics shifting
Video: What's your DDoS attack mitigation plan?
Related Q&A from Clive Longbottom
Should facilities and IT teams agree on one cohesive DCIM tool for everything in the data center? Are DCIM vendors offering that?continue reading
What tools can I use to manage capacity to accommodate further VM growth in a complex IT environment?continue reading
You've sentenced your production servers to five-to-life lockdown in a secure colocation cage. Who's allowed to visit them?continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.