Flow Monitoring_ DDoS Protection for Networks
Flow Monitoring_ DDoS Protection for Networks
Table of Contents
Print
Flow Monitoring: DDoS Protection for Networks
Last Updated Apr 28, 2024 3 minute read Summarize Documentation Cloud WAF DDoS Protection for Networks User Guide Public
Imperva’s Flow Monitoring service helps organizations subscribed to the DDoS Protection for Networks service in on-demand deployment mode to automatically detect
DDoS attacks and activate the service.
Flow Monitoring protects your organization by regularly analyzing network traffic to determine legitimate traffic and anomalies. This service monitors the origin network
edge routers and firewalls and provides packet level visibility for both customers and Imperva’s Network Operations Center (NOC) team. Any attack that targets the origin
network will be identified by Imperva and customers will be immediately informed via their preferred channel.
Benefits
24x7 network monitoring for detecting DDoS attacks
DDoS notifications via email, text message, and phone call
SLA for DDoS detection performance
Real-time dashboard for traffic monitoring and event analysis
Multi-terabit DDoS scrubbing capabilities
Backed up by 24x7 NOC and SOC teams
How it works
Flow Monitoring helps protect your networks by collecting and analyzing network traffic data. This data is used to establish a baseline understanding of normal network
traffic patterns. Any deviations from this baseline can then be identified as potential indicators of DDoS attacks or other network anomalies, and network traffic is directed
to the Behemoth for scrubbing. The scrubbed traffic is then directed to your origin servers to continue the processing the request.
NetFlow: a network protocol developed by Cisco. NetFlow versions: 5, 9 and 10 are supported
sFlow: a protocol similar to NetFlow. It is generally supported on Layer 2 networking equipment, such as switches and firewalls
jFlow: a data flow sampling technology employed by Juniper switches and routers for network monitoring
IPFIX: a network flow monitoring protocol standardized by the IETF
Traffic Profiling
Traffic profiles enable Imperva to establish baseline traffic for your origin networks. When you enable Flow Monitoring, Imperva compares real-time traffic against the
established baseline to detect potential DDoS attacks. Imperva continually updates a network's traffic profile to maintain an accurate baseline for network traffic.
Detecting Attacks
Anomalies to the established baseline network traffic trigger an alert to Imperva. The traffic pattern is then automatically analyzed to determine if it's a DDoS attack or a
false-positive. In the case of a real attack, Imperva notifies you according to a pre-defined escalation path and using the preferred method of communication. Imperva
provides a 15-minute Service Level Agreement (SLA) for the whole process, although it is typically completed within 1 minute. Imperva can notify you by any or all of these
options:
Phone call
Text message
.
Read More
Flow Monitoring Settings
Introduction: DDoS Protection for Networks
Analytics: DDoS Protection for Networks and IPs
https://docs.imperva.com/bundle/cloud-application-security/page/introducing/network-ddos-monitoring.htm 1/2
12/19/24, 1:24 PM Flow Monitoring: DDoS Protection for Networks
Contact
+1 (866) 926-4678
or Contact Us
Follow us
Cookie Policy
Privacy and Legal
Modern Slavery Statement
Powered By
https://docs.imperva.com/bundle/cloud-application-security/page/introducing/network-ddos-monitoring.htm 2/2