{"id":3945,"date":"2013-07-19T13:33:02","date_gmt":"2013-07-19T12:33:02","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=3945"},"modified":"2019-12-31T11:35:58","modified_gmt":"2019-12-31T10:35:58","slug":"ddos-quelle-strategie-de-protection","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/07\/ddos-quelle-strategie-de-protection\/","title":{"rendered":"DDoS, quelle strat\u00e9gie de protection ?"},"content":{"rendered":"<p>Au vu de la multiplication et de la d\u00e9mocratisation des <a title=\"DDoS, les attaques se diversifient !\" href=\"http:\/\/www.solucominsight.fr\/2013\/06\/ddos-les-attaques-se-diversifient\/\">attaques par d\u00e9ni de service<\/a>, la question de la \u00ab\u00a0protection anti-DDoS\u00a0\u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises.<\/p>\n<p>Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque).<\/p>\n<h2>Un choix technologique et strat\u00e9gique<\/h2>\n<p>Les mesures techniques visent \u00e0 mettre en place une protection physique par le biais d\u2019\u00e9quipements de s\u00e9curit\u00e9, pouvant s\u2019op\u00e9rer \u00e0 deux niveaux\u00a0: en amont du SI\u00a0(au niveau des r\u00e9seaux de l\u2019op\u00e9rateur) et directement en frontal (sur le site \u00e0 prot\u00e9ger).<\/p>\n<p>Plusieurs strat\u00e9gies sont alors possibles :<\/p>\n<ul>\n<li>Une protection exclusivement manuelle\u00a0: il s\u2019agit de la mise en place de filtrages sp\u00e9cifiques par l\u2019op\u00e9rateur et de la configuration d\u2019\u00e9quipements de s\u00e9curit\u00e9 du SI. Cette strat\u00e9gie \u00e0 faible co\u00fbt, pouvant \u00eatre qualifi\u00e9e de \u00ab\u00a0protection par d\u00e9faut\u00a0\u00bb, est aujourd\u2019hui la plus commun\u00e9ment utilis\u00e9e.<\/li>\n<li>Un \u00ab\u00a0bo\u00eetier anti-DDoS\u00a0\u00bb en frontal : proche du SI, ce bo\u00eetier sert de \u00ab bouclier\u00a0\u00bb et permet une protection imm\u00e9diate, avec r\u00e9injection du trafic l\u00e9gitime. Il n\u00e9cessite en revanche une expertise interne cons\u00e9quente etpeut ainsi entra\u00eener d\u2019importants co\u00fbts r\u00e9currents, en plus des co\u00fbts li\u00e9s \u00e0 l\u2019investissement . De plus, sans protection en amont du SI, le niveau de protection offert par le bo\u00eetier face aux attaques volum\u00e9triques est limit\u00e9 \u00e0 la capacit\u00e9 du lien r\u00e9seau qui le pr\u00e9c\u00e8de. Utilis\u00e9 seul, un tel bo\u00eetier montre rapidement ses limites.<\/li>\n<\/ul>\n<ul>\n<li>Une protection Cloud, en amont : situ\u00e9e dans le Cloud ou le r\u00e9seau op\u00e9rateur, cette protection permet de b\u00e9n\u00e9ficier d\u2019un service et d\u2019une expertise externalis\u00e9s. Gr\u00e2ce \u00e0 ses m\u00e9canismes de redirection ponctuelle ou permanente, de nettoyage du trafic et de r\u00e9injection, elle permet la gestion d\u2019attaques \u00e0 forte volum\u00e9trie. Cette solution entra\u00eene en revanche des co\u00fbts \u00e9lev\u00e9s et ne permet pas de se prot\u00e9ger contre l\u2019ensemble des diff\u00e9rents types d\u2019attaques.<\/li>\n<\/ul>\n<ul>\n<li>Une strat\u00e9gie hybride\u00a0: il s\u2019agit ici d\u2019allier deux des trois premi\u00e8res strat\u00e9gies, \u00e0 savoir une protection distante dite \u00ab\u00a0Cloud\u00a0\u00bb et un bo\u00eetier physique, en frontal du SI. Malgr\u00e9 un co\u00fbt logiquement le plus \u00e9lev\u00e9, les avantages viennent s\u2019additionner et permettent de faire face \u00e0 l\u2019\u00e9volution de la menace. Les attaques \u00e0 la fois volum\u00e9triques et par saturation de table d\u2019\u00e9tat, aux niveaux r\u00e9seau ou applicatif peuvent ici \u00eatre ma\u00eetris\u00e9es et la continuit\u00e9 du service est assur\u00e9e.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_4012\" aria-describedby=\"caption-attachment-4012\" style=\"width: 419px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.solucominsight.fr\/2013\/07\/ddos-quelle-strategie-de-protection\/protection-hybride-2\/\" rel=\"attachment wp-att-4012\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-4012\" title=\"protection hybride\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2013\/07\/protection-hybride1.jpg\" alt=\"\" width=\"419\" height=\"177\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/07\/protection-hybride1.jpg 1224w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/07\/protection-hybride1-437x185.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/07\/protection-hybride1-71x30.jpg 71w\" sizes=\"auto, (max-width: 419px) 100vw, 419px\" \/><\/a><figcaption id=\"caption-attachment-4012\" class=\"wp-caption-text\">Sch\u00e9matisation d\u2019une solution de protection hybride<\/figcaption><\/figure>\n<p>Ce choix de strat\u00e9gie reste complexe et diff\u00e8rera \u00e9videmment d\u2019une entreprise \u00e0 l\u2019autre en fonction des besoins en mati\u00e8re de s\u00e9curit\u00e9. Il d\u00e9pendra en effet de son niveau d\u2019exposition \u00e0 la menace et de la gravit\u00e9 des impacts en cas d\u2019attaque.<\/p>\n<h2>Des r\u00e9ponses \u00e9galement organisationnelles<\/h2>\n<p>Au-del\u00e0 de la protection physique, il est important d\u2019acqu\u00e9rir un certain nombre de bonnes pratiques permettant une gestion de crise optimale en cas d\u2019attaque.<\/p>\n<p>Ces mesures organisationnelles peuvent \u00eatre class\u00e9es en<strong> trois \u00e9tapes chronologiques<\/strong>\u00a0:<\/p>\n<p align=\"center\">\u00a0<a href=\"http:\/\/www.solucominsight.fr\/2013\/07\/ddos-quelle-strategie-de-protection\/etapes-ddos\/\" rel=\"attachment wp-att-3946\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3946\" title=\"Classement chronologique des mesures\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2013\/07\/etapes-Ddos.jpg\" alt=\"\" width=\"650\" height=\"198\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/07\/etapes-Ddos.jpg 650w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/07\/etapes-Ddos-437x133.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/07\/etapes-Ddos-71x22.jpg 71w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p>Bien qu\u2019elles soient aujourd\u2019hui d\u00e9mocratis\u00e9es, in\u00e9vitables pour la plupart et parfois ravageuses, les attaques par d\u00e9ni de service distribu\u00e9 engendrent des impacts pouvant \u00eatre relativement ma\u00eetris\u00e9s, pourvu que la question de la protection ait \u00e9t\u00e9 trait\u00e9e \u00e0 temps par l\u2019entreprise.<\/p>\n<p>Malheureusement, force est de constater que peu d\u2019entreprises ont aujourd\u2019hui proc\u00e9d\u00e9 \u00e0 l\u2019acquisition d\u2019une protection adapt\u00e9e \u00e0 la menace cybercriminelle actuelle.<\/p>\n<p>L\u2019actualit\u00e9 forte dans ce domaine les sensibilise n\u00e9anmoins et sera sans doute un catalyseur de la mise en place de ces mesures<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab\u00a0protection anti-DDoS\u00a0\u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la&#8230;<\/p>\n","protected":false},"author":161,"featured_media":6227,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[1712,183,3320,81],"coauthors":[1076,1177],"class_list":["post-3945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-attaque-ddos","tag-cybercriminalite","tag-incident-response-cert-w","tag-protection-des-donnees"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS, quelle strat\u00e9gie de protection ?<\/title>\n<meta name=\"description\" content=\"Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab protection anti-DDoS \u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS, quelle strat\u00e9gie de protection ?\" \/>\n<meta property=\"og:description\" content=\"Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab protection anti-DDoS \u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-19T12:33:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:35:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ali Fawaz, Baptistin Buchet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ali Fawaz, Baptistin Buchet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/\"},\"author\":{\"name\":\"Ali Fawaz\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/603e270f2a43f0064352928ef7718f88\"},\"headline\":\"DDoS, quelle strat\u00e9gie de protection ?\",\"datePublished\":\"2013-07-19T12:33:02+00:00\",\"dateModified\":\"2019-12-31T10:35:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/\"},\"wordCount\":672,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"keywords\":[\"attaque DDoS\",\"Cybercriminalit\u00e9\",\"incident response CERT-W\",\"protection des donn\u00e9es\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/\",\"name\":\"DDoS, quelle strat\u00e9gie de protection ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"datePublished\":\"2013-07-19T12:33:02+00:00\",\"dateModified\":\"2019-12-31T10:35:58+00:00\",\"description\":\"Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab protection anti-DDoS \u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg\",\"width\":1500,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS, quelle strat\u00e9gie de protection ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/603e270f2a43f0064352928ef7718f88\",\"name\":\"Ali Fawaz\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/ali-fawaz\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS, quelle strat\u00e9gie de protection ?","description":"Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab protection anti-DDoS \u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/","og_locale":"en_US","og_type":"article","og_title":"DDoS, quelle strat\u00e9gie de protection ?","og_description":"Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab protection anti-DDoS \u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque).","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/","og_site_name":"RiskInsight","article_published_time":"2013-07-19T12:33:02+00:00","article_modified_time":"2019-12-31T10:35:58+00:00","og_image":[{"width":1500,"height":1125,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","type":"image\/jpeg"}],"author":"Ali Fawaz, Baptistin Buchet","twitter_misc":{"Written by":"Ali Fawaz, Baptistin Buchet","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/"},"author":{"name":"Ali Fawaz","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/603e270f2a43f0064352928ef7718f88"},"headline":"DDoS, quelle strat\u00e9gie de protection ?","datePublished":"2013-07-19T12:33:02+00:00","dateModified":"2019-12-31T10:35:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/"},"wordCount":672,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","keywords":["attaque DDoS","Cybercriminalit\u00e9","incident response CERT-W","protection des donn\u00e9es"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/","name":"DDoS, quelle strat\u00e9gie de protection ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","datePublished":"2013-07-19T12:33:02+00:00","dateModified":"2019-12-31T10:35:58+00:00","description":"Au vu de la multiplication et de la d\u00e9mocratisation des attaques par d\u00e9ni de service, la question de la \u00ab protection anti-DDoS \u00bb entre au c\u0153ur des d\u00e9cisions SSI pour les grandes entreprises. Il est aujourd\u2019hui n\u00e9cessaire d\u2019allier des mesures \u00e0 la fois techniques et organisationnelles permettant de r\u00e9pondre \u00e0 deux enjeux cruciaux : la d\u00e9tection (avant l\u2019attaque) et la r\u00e9action (apr\u00e8s l\u2019attaque).","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/maxkabakov-fotolia.com_.jpg","width":1500,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/ddos-quelle-strategie-de-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"DDoS, quelle strat\u00e9gie de protection ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/603e270f2a43f0064352928ef7718f88","name":"Ali Fawaz","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/ali-fawaz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=3945"}],"version-history":[{"count":12,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3945\/revisions"}],"predecessor-version":[{"id":6256,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3945\/revisions\/6256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6227"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=3945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=3945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=3945"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=3945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}