{"id":630,"date":"2015-10-01T16:29:15","date_gmt":"2015-10-01T16:29:15","guid":{"rendered":"\/?p=630"},"modified":"2015-10-01T16:29:15","modified_gmt":"2015-10-01T16:29:15","slug":"brains-vs-brawn-cracking-the-seventh-layer","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/brains-vs-brawn-cracking-the-seventh-layer\/","title":{"rendered":"Brains vs. Brawn \u2013 Cracking the Seventh Layer"},"content":{"rendered":"<p><em>Author:<\/em> <em>Rishi Agarwal, Chief Evangelist, NSFOCUS<\/em><\/p>\n<p>When the news reports on DDoS attacks, it is generally referring to large-scale network attacks that are focused on Layer 3 and 4 of the network stack. However, from a mitigation point of view, network layer attacks are not sophisticated. The ability to mitigate this type of attack always comes down to a simple question: who has more network capacity, the attacker or the mitigation service?<\/p>\n<p>On the other hand, the application\/Layer 7 attack is a completely different animal. When defending against these stealthy and complex methods, success does not depend on how big you are, but rather how smart your security technology is and how well it can be utilized.<\/p>\n<p><strong>The Invisible Attack<\/strong><\/p>\n<p>Successful mitigation of the Layer 7 DDoS attack relies on the ability to accurately profile incoming traffic \u2013 to distinguish between humans, human-like bots and hijacked Web browsers and connected devices, such as home routers. As a result, the Layer 7 mitigation process is often much more complex than the attack itself. This complexity, combined with the fact that\u2014if done right\u2014the attack will remain transparent, contributes to the lack of headlines on this subject. The security industry in general prefers to talk in terms of network capacity, which of course says nothing about your resilience against application layer attacks.<\/p>\n<p>While network attacks over-exercise specific functions or features of a website with the intention of disabling them, an application-layer attack is different because many vulnerabilities that exist in the proprietary code of Web applications are unknown to existing security defense solutions.<\/p>\n<p>The Cloud and pervasive cloud-based platforms that are becoming the new normal in application development have increased the attack surface for many organizations. In order to defend against the ever-changing DDoS landscape, developers need to integrate security measures while in the development phase of the application itself.<\/p>\n<p>To assist in defending against Web threats, the Open Web Application Security Project (OWASP) was created. It releases some of the most critical risks facing organizations in its \u201c<a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\">Top Ten Most Critical Web Application Security Risks<\/a>.\u201d<\/p>\n<p>While the report outlines ten of the most prevalent application-layer risks, this information is only released every three years. In the meantime, new and more sophisticated attack methods are being perpetrated at an alarming rate. Until developer\u2019s ingrain security solutions into their products, it will be up to security teams to be ever vigilant by implementing solutions that are designed to identify anomalous behavior in the network upon ingress.<\/p>\n<p><strong>Best Practices to Protect Critical Applications.<\/strong><\/p>\n<p>If you are a software developer or cyber security professional it is vital that the following best practices be followed, at a minimum.<\/p>\n<ul>\n<li><strong>Educate yourself on the threats<\/strong> \u2013 Become familiar with Web application security risks that have already been identified. The OWASP Top-10 Web application security risks list is a great start.<\/li>\n<li><strong>Review your organization\u2019s policies as they relate to content and security<\/strong> \u2013 Is there a valid plan for protecting company data assets from DDoS attacks? Is it current? Are you meeting compliance regulations? Are all company divisions involved? Remember, representation from business, IT and security should all be a part of the software development lifecycle.<\/li>\n<li><strong>Speak with a security expert<\/strong> \u2013 Gain insight from the experts in the field. Whether it\u2019s an analyst firm or a solution provider, look to the professional to learn what best practices are recommended in today\u2019s threat environment and develop a mitigation plan that accounts for all threats, including the hard-to-spot Layer-7 DDoS attack.<\/li>\n<li><strong>Install equipment that secures the network from within<\/strong>\u2013 This needs appliances that are custom built to detect and mitigate Application Layer -7 attacks intelligently and quickly. Such protection is available as-a-feature of other network \/security appliances, but complete protection requires custom build anti-DDoS appliances.<\/li>\n<\/ul>\n<p>In summary, application layer attacks are here to stay and grow in frequency and complexity. It may not be economical to develop new applications from ground up. Therefore, secure application development policies need to be complemented by dedicated security appliances for complete \u201cpeace of mind\u201d protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Rishi Agarwal, Chief Evangelist, NSFOCUS When the news reports on DDoS attacks, it is generally referring to large-scale network attacks that are focused on Layer 3 and 4 of the network stack. However, from a mitigation point of view, network layer attacks are not sophisticated. The ability to mitigate this type of attack always [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24251,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Author: Rishi Agarwal, Chief Evangelist, NSFOCUS When the news reports on DDoS attacks, it is generally referring to large-scale network attacks that are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-01T16:29:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Author: Rishi Agarwal, Chief Evangelist, NSFOCUS When the news reports on DDoS attacks, it is generally referring to large-scale network attacks that are\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Brains vs. Brawn \u2013 Cracking the Seventh Layer\",\"datePublished\":\"2015-10-01T16:29:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/\"},\"wordCount\":675,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Image.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/\",\"name\":\"Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Image.png\",\"datePublished\":\"2015-10-01T16:29:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Image.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Image.png\",\"width\":641,\"height\":910,\"caption\":\"2022 Cybersecurity Insights report cover page.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/brains-vs-brawn-cracking-the-seventh-layer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brains vs. Brawn \u2013 Cracking the Seventh Layer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS","og_description":"Author: Rishi Agarwal, Chief Evangelist, NSFOCUS When the news reports on DDoS attacks, it is generally referring to large-scale network attacks that are","og_url":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/","og_site_name":"NSFOCUS","article_published_time":"2015-10-01T16:29:15+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS","twitter_description":"Author: Rishi Agarwal, Chief Evangelist, NSFOCUS When the news reports on DDoS attacks, it is generally referring to large-scale network attacks that are","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Brains vs. Brawn \u2013 Cracking the Seventh Layer","datePublished":"2015-10-01T16:29:15+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/"},"wordCount":675,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png","articleSection":["Blog"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/","url":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/","name":"Brains vs. Brawn \u2013 Cracking the Seventh Layer - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png","datePublished":"2015-10-01T16:29:15+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Image.png","width":641,"height":910,"caption":"2022 Cybersecurity Insights report cover page."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/brains-vs-brawn-cracking-the-seventh-layer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Brains vs. Brawn \u2013 Cracking the Seventh Layer"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=630"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/630\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/24251"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}