{"id":27010,"date":"2023-11-13T01:06:37","date_gmt":"2023-11-13T01:06:37","guid":{"rendered":"https:\/\/nsfocusglobal.com\/quais-as-diferencas-entre-ataques-ddos-na-camada-de-aplicacao-e-na-camada-de-rede\/"},"modified":"2023-11-13T01:06:37","modified_gmt":"2023-11-13T01:06:37","slug":"what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/","title":{"rendered":"What are the differences between DDoS attacks on the application layer and the network layer"},"content":{"rendered":"\n<p>The market for services protecting against distributed denial of service attacks, or <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/solucao-anti-ddos\/\" target=\"_blank\" rel=\"noreferrer noopener\">Anti-DDoS<\/a>, has a significant focus on mitigating attacks aimed at the network layer of companies&#8217; infrastructure.<\/p>\n\n\n\n<p>In this type of attack, infected vectors are commonly used to generate requests without the aim of concrete communication, intending to flood internet transmission links with an excessive amount of packets, creating more traffic than these links can handle. In other words, the illegitimate traffic becomes much greater than the capacity the link has under contract or even what it can physically support, rendering the service unavailable.<\/p>\n\n\n\n<p>For this reason, despite the wide variety of strategies and protocols used in DDoS crimes at the network layer, this type of attack is easier to detect and mitigate. Sometimes, it draws so much attention from a company&#8217;s infrastructure team that it is also used as a &#8216;smokescreen,&#8217; as it diverts attention to its countermeasures, other undetected vulnerabilities are exploited simultaneously.<\/p>\n\n\n\n<p>&#8220;In application layer <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/o-que-e-ataque-ddos\/\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS attacks<\/a>, attackers use more sophisticated mechanisms. They do not flood the network with traffic or sessions but slowly deplete resources of specific applications or services within that layer. These attacks can be effective even with low traffic rates, and from the protocol&#8217;s perspective, the involved traffic may appear legitimate, making them even harder to detect. Examples of application layer attacks include HTTP floods and Slowloris attacks.<\/p>\n\n\n\n<p>For defense against application layer attacks, NSFOCUS has developed customized algorithms based on the traffic characteristics of different layers. For instance, in the case of an HTTP Flood, if a botnet uses tools to launch an attack with a real TCP\/IP protocol stack, TCP\/IP source authentication alone cannot recognize it as an attack.<\/p>\n\n\n\n<p>Therefore, it is necessary to enable source authentication at the application layer, such as HTTP 302 to redirect requests and verify if the browser sending the request is trustworthy. Only real browsers have a complete mechanism for verifying the HTTP protocol stack, and through this authentication, one can determine whether the traffic at that moment is legitimate or not.<\/p>\n\n\n\n<p>If you have any questions or want to know more about NSFOCUS solutions, please <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact our team<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The market for services protecting against distributed denial of service attacks, or Anti-DDoS, has a significant focus on mitigating attacks aimed at the network layer of companies&#8217; infrastructure. In this type of attack, infected vectors are commonly used to generate requests without the aim of concrete communication, intending to flood internet transmission links with an [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":26981,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-27010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede<\/title>\n<meta name=\"description\" content=\"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede\" \/>\n<meta property=\"og:description\" content=\"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-13T01:06:37+00:00\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede\" \/>\n<meta name=\"twitter:description\" content=\"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"What are the differences between DDoS attacks on the application layer and the network layer\",\"datePublished\":\"2023-11-13T01:06:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/\"},\"wordCount\":373,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/\",\"name\":\"Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2023-11-13T01:06:37+00:00\",\"description\":\"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the differences between DDoS attacks on the application layer and the network layer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede","description":"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/","og_locale":"pt_BR","og_type":"article","og_title":"Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede","og_description":"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.","og_url":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/","og_site_name":"NSFOCUS","article_published_time":"2023-11-13T01:06:37+00:00","author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede","twitter_description":"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"What are the differences between DDoS attacks on the application layer and the network layer","datePublished":"2023-11-13T01:06:37+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/"},"wordCount":373,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#primaryimage"},"thumbnailUrl":"","articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/","url":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/","name":"Diferen\u00e7as entre ataques DDoS na camada de aplica\u00e7\u00e3o e de rede","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#primaryimage"},"thumbnailUrl":"","datePublished":"2023-11-13T01:06:37+00:00","description":"Voc\u00ea sabe as diferen\u00e7as entre os ataques DDoS na camada de aplica\u00e7\u00e3o e na camada de rede? Caso tenha d\u00favida sobre o tema, confira o Guia da NSFOCUS.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/what-are-the-differences-between-ddos-attacks-on-the-application-layer-and-the-network-layer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"What are the differences between DDoS attacks on the application layer and the network layer"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/27010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=27010"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/27010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=27010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=27010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=27010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}