0% found this document useful (0 votes)
7 views2 pages

Flow Monitoring_ DDoS Protection for Networks

Uploaded by

cocanhsat115ne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

Flow Monitoring_ DDoS Protection for Networks

Uploaded by

cocanhsat115ne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

12/19/24, 1:24 PM Flow Monitoring: DDoS Protection for Networks

Cloud Application and Network Security


Flow Monitoring: DDoS Protection for Networks

Table of Contents

Print
Flow Monitoring: DDoS Protection for Networks
Last Updated Apr 28, 2024 3 minute read Summarize Documentation Cloud WAF DDoS Protection for Networks User Guide Public

Imperva’s Flow Monitoring service helps organizations subscribed to the DDoS Protection for Networks service in on-demand deployment mode to automatically detect
DDoS attacks and activate the service.
Flow Monitoring protects your organization by regularly analyzing network traffic to determine legitimate traffic and anomalies. This service monitors the origin network
edge routers and firewalls and provides packet level visibility for both customers and Imperva’s Network Operations Center (NOC) team. Any attack that targets the origin
network will be identified by Imperva and customers will be immediately informed via their preferred channel.

Benefits
24x7 network monitoring for detecting DDoS attacks
DDoS notifications via email, text message, and phone call
SLA for DDoS detection performance
Real-time dashboard for traffic monitoring and event analysis
Multi-terabit DDoS scrubbing capabilities
Backed up by 24x7 NOC and SOC teams

How it works
Flow Monitoring helps protect your networks by collecting and analyzing network traffic data. This data is used to establish a baseline understanding of normal network
traffic patterns. Any deviations from this baseline can then be identified as potential indicators of DDoS attacks or other network anomalies, and network traffic is directed
to the Behemoth for scrubbing. The scrubbed traffic is then directed to your origin servers to continue the processing the request.

Collecting Traffic Data for Monitoring


You send network traffic data feeds from your edge networking devices to the Flow Monitoring service. These feeds contain information, such as packet types, rates and
size, which Imperva uses to establish and update baseline network traffic and to identify anomalies to the baseline. You can send these traffic feeds:

NetFlow: a network protocol developed by Cisco. NetFlow versions: 5, 9 and 10 are supported
sFlow: a protocol similar to NetFlow. It is generally supported on Layer 2 networking equipment, such as switches and firewalls
jFlow: a data flow sampling technology employed by Juniper switches and routers for network monitoring
IPFIX: a network flow monitoring protocol standardized by the IETF

Traffic Profiling
Traffic profiles enable Imperva to establish baseline traffic for your origin networks. When you enable Flow Monitoring, Imperva compares real-time traffic against the
established baseline to detect potential DDoS attacks. Imperva continually updates a network's traffic profile to maintain an accurate baseline for network traffic.

Detecting Attacks
Anomalies to the established baseline network traffic trigger an alert to Imperva. The traffic pattern is then automatically analyzed to determine if it's a DDoS attack or a
false-positive. In the case of a real attack, Imperva notifies you according to a pre-defined escalation path and using the preferred method of communication. Imperva
provides a 15-minute Service Level Agreement (SLA) for the whole process, although it is typically completed within 1 minute. Imperva can notify you by any or all of these
options:

Email

Phone call

Text message
.
Read More
Flow Monitoring Settings
Introduction: DDoS Protection for Networks
Analytics: DDoS Protection for Networks and IPs

Welcome to Imperva! 👋 How


can I direct you?

https://docs.imperva.com/bundle/cloud-application-security/page/introducing/network-ddos-monitoring.htm 1/2
12/19/24, 1:24 PM Flow Monitoring: DDoS Protection for Networks

Contact
+1 (866) 926-4678
or Contact Us

Follow us

© Copyright 2024 Imperva. All Rights Reserved

Cookie Policy
Privacy and Legal
Modern Slavery Statement

Powered By

https://docs.imperva.com/bundle/cloud-application-security/page/introducing/network-ddos-monitoring.htm 2/2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy