Signatures—or ‘DDoS Signature’ or ‘IPS DDoS Signatures’—refers to a significant DDoS mitigation technology in which DDoS attacks are detected and blocked based on their known patterns. For example, the famous Anonymous tool LOIC (Low Orbit Ion Canon) carries a certain pattern that a signature can block.
Signatures are divided into two types: vendor and user. Vendor signatures come in large numbers and are based on vendor research. User signatures are created by the user typically during an attack or after it. Both maintain an important role in DDoS mitigation.
ARE YOU READY ?
Answer seven online questions and get a free report assessing your protection status with recommendations for improvement