{"id":19543,"date":"2022-05-13T10:30:03","date_gmt":"2022-05-13T10:30:03","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=19543"},"modified":"2026-04-17T18:07:44","modified_gmt":"2026-04-17T18:07:44","slug":"nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/","title":{"rendered":"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"216\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19545\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-300x63.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-768x162.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-600x127.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-200x42.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a.jpg 1516w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b.jpg\"><img decoding=\"async\" width=\"1024\" height=\"218\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b-1024x218.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19547\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b-1024x218.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b-300x64.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b-768x163.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b-600x128.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b-200x43.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513b.jpg 1509w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Incident Response<\/strong><\/h2>\n\n\n\n<p>On mid-2021, a multinational telecom service provider was attacked by a sudden large-scale DDoS attack with the peak value of 170Gbps with maximum 5Gbps of malicious traffic leakage, with equivalent Mitigation Effect (mitigated malicious traffic\/total ingress traffic) stays at least 97%. The service provider did not encounter service interruption during the whole incident. However, NSFOCUS Managed Security Service team always want to do more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Incident Playback and Further Analysis<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>SYN Flood<\/li><\/ul>\n\n\n\n<p>Comprehensive analysis afterwards discovered that only SYN packets are included in the malicious traffic and no ACK packet or SYN \/ACK packet was found, also the TSval used to indicate the local time when sending out the packet are never changed, thus this can be used to identify the malicious traffic more precisely.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480.jpg\"><img decoding=\"async\" width=\"1024\" height=\"425\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480-1024x425.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19554\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480-1024x425.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480-300x125.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480-768x319.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480-600x249.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480-200x83.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513c_1652438480.jpg 1185w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>UDP Flood<\/li><\/ul>\n\n\n\n<p>We also identified a UDP Flood attack targeting port 3283 (Apple Remote Desktop Protocol).<\/p>\n\n\n\n<p>In the captured packets, the TTL (time-to-live) of all packets lies between 48 to 59 and packet length are all at 1006. Meanwhile, the data field of each packet was filled with the hostname of the source IPs (BUTL300MAC04).<\/p>\n\n\n\n<p>According to the above characteristics, we have sufficient evidence to assume that the attack packets are generated by tools. By remotely triggering black hole (RTBH) aiming the source IP or filtering directly with ACL, such attacks can be effectively mitigated.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"571\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458-1024x571.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19556\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458-1024x571.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458-300x167.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458-768x428.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458-150x85.jpg 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458-600x335.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458-200x112.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513d_1652438458.jpg 1108w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513e.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"637\" height=\"150\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513e.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19549\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513e.jpg 637w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513e-300x71.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513e-600x141.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513e-200x47.jpg 200w\" sizes=\"(max-width: 637px) 100vw, 637px\" \/><\/a><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>CLDAP Reflection Amplification<\/li><\/ul>\n\n\n\n<p>In the end, a CLDAP reflection amplification attack is also discovered. NSFOCUS suggested the service provider to block UDP source port 389 in case of similar future attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Result<\/strong><\/h2>\n\n\n\n<p>The service provider is satisfied with the mitigation efficiency and quality of attack incident report. The report helped the service provider to trace the source of the attack and corresponding policy tuning suggestions will help to get even better result in the future coming attacks.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Incident Response On mid-2021, a multinational telecom service provider was attacked by a sudden large-scale DDoS attack with the peak value of 170Gbps with maximum 5Gbps of malicious traffic leakage, with equivalent Mitigation Effect (mitigated malicious traffic\/total ingress traffic) stays at least 97%. The service provider did not encounter service interruption during the whole incident. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":35775,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-19543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Incident Response On mid-2021, a multinational telecom service provider was attacked by a sudden large-scale DDoS attack with the peak value of 170Gbps\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-13T10:30:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Incident Response On mid-2021, a multinational telecom service provider was attacked by a sudden large-scale DDoS attack with the peak value of 170Gbps\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident\",\"datePublished\":\"2022-05-13T10:30:03+00:00\",\"dateModified\":\"2026-04-17T18:07:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/\"},\"wordCount\":311,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/0513a-1024x216-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/\",\"name\":\"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/0513a-1024x216-1.jpg\",\"datePublished\":\"2022-05-13T10:30:03+00:00\",\"dateModified\":\"2026-04-17T18:07:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/0513a-1024x216-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/0513a-1024x216-1.jpg\",\"width\":1024,\"height\":216,\"caption\":\"Graph showing ADS traffic trend over time.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS","og_description":"Incident Response On mid-2021, a multinational telecom service provider was attacked by a sudden large-scale DDoS attack with the peak value of 170Gbps","og_url":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/","og_site_name":"NSFOCUS","article_published_time":"2022-05-13T10:30:03+00:00","article_modified_time":"2026-04-17T18:07:44+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS","twitter_description":"Incident Response On mid-2021, a multinational telecom service provider was attacked by a sudden large-scale DDoS attack with the peak value of 170Gbps","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident","datePublished":"2022-05-13T10:30:03+00:00","dateModified":"2026-04-17T18:07:44+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/"},"wordCount":311,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg","articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/","url":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/","name":"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg","datePublished":"2022-05-13T10:30:03+00:00","dateModified":"2026-04-17T18:07:44+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/05\/0513a-1024x216-1.jpg","width":1024,"height":216,"caption":"Graph showing ADS traffic trend over time."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/nsfocus-managed-security-service-case-protection-policy-tuning-for-further-improved-result-in-a-170gbps-ddos-incident\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"NSFOCUS Managed Security Service Case: Protection Policy Tuning for Further Improved Result in a 170Gbps DDoS Incident"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/19543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=19543"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/19543\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35775"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=19543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=19543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=19543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}