{"id":26688,"date":"2024-07-23T17:54:54","date_gmt":"2024-07-23T17:54:54","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=26688"},"modified":"2024-09-23T14:37:35","modified_gmt":"2024-09-23T14:37:35","slug":"security-threats-and-controls-for-mitigating-dos-ddos-attacks","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/","title":{"rendered":"Security Threats and Controls for Mitigating DoS\/DDoS Attacks"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/graciela-martinez\">Graciela Mart\u00ednez<\/a> and <a href=\"https:\/\/blog.lacnic.net\/en\/author\/guillermo-cicileo\">Guillermo Cicilieo<\/a><\/p>\n\n\n\n<p>DoS\/DDoS (Denial of Service\/Distributed Denial of Service) attacks are one of the most common concerns for ISPs. Due to their role in digital infrastructure, ISPs are attractive targets for cybercriminals who can attempt to compromise their network, disrupting their different services.<\/p>\n\n\n\n<p>In this context, we conducted interviews with professionals from various organizations in Latin America and the Caribbean. Our goal was to understand their perspective and based on their experience, have an initial overview of the security threats they face and the extent to which they have implemented controls for their mitigation.<\/p>\n\n\n\n<p>During this findings identification phase, we detected key aspects of the most common issues faced by ISPs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"588\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig1-estudio-ddos-y-su-mitigacion-1024x588.png\" alt=\"\" class=\"wp-image-26676\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig1-estudio-ddos-y-su-mitigacion-1024x588.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig1-estudio-ddos-y-su-mitigacion-300x172.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig1-estudio-ddos-y-su-mitigacion-575x330.png 575w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig1-estudio-ddos-y-su-mitigacion-768x441.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig1-estudio-ddos-y-su-mitigacion.png 1292w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>More actions are necessary<\/strong><\/p>\n\n\n\n<p>According to the interviewees, all organizations recognize <strong>the importance of cybersecurity for protecting assets and ensuring business continuity, yet many acknowledge the need to continue working on implementing more actions<\/strong>. Indeed, there is an awareness that cybersecurity must be included in an organization&#8217;s roadmap as part of its strategy. However, it is often not considered a strategic objective and, instead, security activities are scattered across daily operations.<\/p>\n\n\n\n<p>To deal with the challenges that are emerging in the digital landscape in organizations such as ISPs, it is essential to proactively protect the infrastructures that support the business and promote a safe and reliable online environment for all.<\/p>\n\n\n\n<p>According to information provided by the experts we consulted, the main reasons for this management issue can be divided into the following aspects:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Overdue updates. The lack of hardware, software, and firmware is a common threat.<\/strong> Failure to manage updates and patches represents a risk for organizations, as outdated systems are one of the main attack vectors exploited by cybercriminals.<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Lack of preparation among organizations\u2019 security personnel<\/strong> and <strong>lack of awareness at the management level<\/strong>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Organizations\u2019 internal lack of knowledge about threat detection. <\/strong>Only a third of the professionals surveyed, all of whom serve in administrative roles within their organizations, admitted to having a security incident reported in the last three months. This result might seem encouraging, but it shows significant under-reporting: <strong>the fact that a security incident has not been detected or reported does not mean that it has not occurred<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p><strong>Most popular tools<\/strong><strong><\/strong><\/p>\n\n\n\n<p>The following graph shows the most well-known tools mentioned in the interviews. However, some organizations have not implemented these solutions due to their high cost.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig2-estudio-ddos-y-su-mitigacion-1024x489.png\" alt=\"\" class=\"wp-image-26679\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig2-estudio-ddos-y-su-mitigacion-1024x489.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig2-estudio-ddos-y-su-mitigacion-300x143.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig2-estudio-ddos-y-su-mitigacion-680x325.png 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig2-estudio-ddos-y-su-mitigacion-768x367.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/fig2-estudio-ddos-y-su-mitigacion.png 1194w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>It should be noted that, despite not being anti-DDoS attack tools, many interviewees mentioned RPKI (Public Key Infrastructure) and MANRS (Mutually Agreed Norms for Routing Security) as useful tools to prevent DDoS attacks.<\/p>\n\n\n\n<p><strong>LACNIC support<\/strong><strong><\/strong><\/p>\n\n\n\n<p>LACNIC works on strengthening cybersecurity<a href=\"https:\/\/campus.lacnic.net\/cursos\/\"><\/a> as a strategic issue for ISPs and promotes the training of senior management on the importance of managing this issue within each organization.<\/p>\n\n\n\n<p>We found that professionals from the organizations we interviewed aren&#8217;t in the habit of sharing their best practices with their peers, and often work in isolation in the implementation of control mechanisms and incident containment. <strong>At LACNIC, we aim to create opportunities and spaces for exchanging <\/strong><a href=\"https:\/\/csirt.lacnic.net\/en\"><strong>best practices and recommendations on cybersecurity<\/strong><\/a><strong> so that everyone can be prepared.<\/strong><\/p>\n\n\n\n<p><strong>At LACNIC CSIRT, we encourage our members\u2019 participation <\/strong><a href=\"https:\/\/csirt.lacnic.net\/articulos-y-novedades\/honeynet-del-csirt-de-lacnic\"><strong>in projects such as HoneyNet<\/strong><\/a><strong>, which aim to strengthen security monitoring capabilities and improve early detection of attacks in the region.<\/strong><\/p>\n\n\n\n<p>We invite you to check out the information and resources LACNIC provides to address <strong>this community&#8217;s issues and interests<\/strong>, including <a href=\"https:\/\/imasd.lacnic.net\/en\"><strong>R&amp;D technical reports<\/strong><\/a><strong> and <\/strong><a href=\"https:\/\/blog.lacnic.net\/en\/tag\/cibersecurity\"><strong>articles on cybersecurity<\/strong><\/a><strong> available on our blog.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Graciela Mart\u00ednez and Guillermo Cicilieo DoS\/DDoS (Denial of Service\/Distributed Denial of Service) attacks are one of the most common concerns for ISPs. Due to their role in digital infrastructure, ISPs are attractive targets for cybercriminals who can attempt to compromise their network, disrupting their different services. In this context, we conducted interviews with professionals [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":26682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1242,1221],"tipo_autor":[],"class_list":["post-26688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-graciela-martinez-en","taxonomy-authors-guillermo-cicileo-en"],"acf":{"author":"By Graciela Mart\u00ednez and Guillermo Cicilieo","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Security Threats and Controls for Mitigating DoS\/DDoS Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Security Threats and Controls for Mitigating DoS\/DDoS Attacks\" \/>\n<meta property=\"og:description\" content=\"By Graciela Mart\u00ednez and Guillermo Cicilieo DoS\/DDoS (Denial of Service\/Distributed Denial of Service) attacks are one of the most common concerns for ISPs. Due to their role in digital infrastructure, ISPs are attractive targets for cybercriminals who can attempt to compromise their network, disrupting their different services. In this context, we conducted interviews with professionals [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-23T17:54:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-23T14:37:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Security Threats and Controls for Mitigating DoS\/DDoS Attacks\",\"datePublished\":\"2024-07-23T17:54:54+00:00\",\"dateModified\":\"2024-09-23T14:37:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\"},\"wordCount\":590,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\",\"name\":\"LACNIC Blog | Security Threats and Controls for Mitigating DoS\/DDoS Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png\",\"datePublished\":\"2024-07-23T17:54:54+00:00\",\"dateModified\":\"2024-09-23T14:37:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Threats and Controls for Mitigating DoS\/DDoS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Security Threats and Controls for Mitigating DoS\/DDoS Attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Security Threats and Controls for Mitigating DoS\/DDoS Attacks","og_description":"By Graciela Mart\u00ednez and Guillermo Cicilieo DoS\/DDoS (Denial of Service\/Distributed Denial of Service) attacks are one of the most common concerns for ISPs. Due to their role in digital infrastructure, ISPs are attractive targets for cybercriminals who can attempt to compromise their network, disrupting their different services. In this context, we conducted interviews with professionals [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-07-23T17:54:54+00:00","article_modified_time":"2024-09-23T14:37:35+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Security Threats and Controls for Mitigating DoS\/DDoS Attacks","datePublished":"2024-07-23T17:54:54+00:00","dateModified":"2024-09-23T14:37:35+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/"},"wordCount":590,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/","url":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/","name":"LACNIC Blog | Security Threats and Controls for Mitigating DoS\/DDoS Attacks","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png","datePublished":"2024-07-23T17:54:54+00:00","dateModified":"2024-09-23T14:37:35+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Security Threats and Controls for Mitigating DoS\/DDoS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/estudio-ddos-y-su-mitigacion-2024.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":26673,"post_title":"Amenazas de seguridad y controles de mitigaci\u00f3n de ataques de DoS\/DDoS","slug":"amenazas-de-seguridad-y-controles-de-mitigacion-de-ataques-de-dos-ddos","href":"https:\/\/blog.lacnic.net\/amenazas-de-seguridad-y-controles-de-mitigacion-de-ataques-de-dos-ddos\/"},{"locale":"pt_BR","id":26691,"post_title":"Amea\u00e7as \u00e0 seguran\u00e7a e controles de mitiga\u00e7\u00e3o de ataques de DoS\/DDoS","slug":"ameacas-a-seguranca-e-controles-de-mitigacao-de-ataques-de-dos-ddos","href":"https:\/\/blog.lacnic.net\/pt-br\/ameacas-a-seguranca-e-controles-de-mitigacao-de-ataques-de-dos-ddos\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=26688"}],"version-history":[{"count":6,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26688\/revisions"}],"predecessor-version":[{"id":27280,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26688\/revisions\/27280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/26682"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=26688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=26688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=26688"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=26688"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=26688"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=26688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}