{"id":5949,"date":"2014-11-07T10:34:34","date_gmt":"2014-11-07T09:34:34","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5949"},"modified":"2019-12-31T11:09:27","modified_gmt":"2019-12-31T10:09:27","slug":"lutte-anti-ddos-technique-suffit-pas-organisons","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/","title":{"rendered":"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !"},"content":{"rendered":"<p><em>Depuis quelques ann\u00e9es, les attaques par d\u00e9ni de service distribu\u00e9 (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es ; leur facilit\u00e9 d\u2019acc\u00e8s et d\u2019usage, leur efficacit\u00e9 prouv\u00e9e et leur grande vari\u00e9t\u00e9 les propulsent aujourd\u2019hui en t\u00eate des tactiques de diversion et des moyens d\u2019atteinte \u00e0 l\u2019image. Une aubaine pour les cyber-attaquants qui font progresser \u00e0 la fois la dur\u00e9e et la force des attaques.<\/em><\/p>\n<p>Face \u00e0 ce constat, les entreprises se sont rapidement interrog\u00e9es sur les moyens de protection possibles.\u00a0 Le march\u00e9 s\u2019est adapt\u00e9. Aujourd\u2019hui, deux strat\u00e9gies se dessinent, entre solutions historiques manuelles et solutions novatrices hybrides (Cloud et\/ou on-premise).<\/p>\n<p>Une question se pose toutefois : la mise en \u0153uvre d\u2019une telle solution de protection, certes adapt\u00e9e aux besoins, suffit-elle pour s\u2019assurer d\u2019une efficacit\u00e9 solide en cas d\u2019attaque av\u00e9r\u00e9e ? La r\u00e9ponse est non !<\/p>\n<p>Imaginez, vous avez subi pendant plusieurs jours les effets d\u2019une attaque DDoS, avec des cons\u00e9quences inacceptables pour le maintien de vos activit\u00e9s. Vous d\u00e9cidez de mettre en place une solution de protection ad hoc. Le projet d\u00e9marre, vous choisissez une solution, elle est install\u00e9e et fonctionne. Vous voil\u00e0 enfin \u00e9quip\u00e9 d\u2019une solution d\u2019une efficacit\u00e9 prometteuse. Avec un simple ordre de bascule \u00e0 donner \u00e0 votre \u00e9quipe de production ou \u00e0 un fournisseur, la solution sera mise en route. Vous \u00eates confiant.<\/p>\n<h2>Activation, surveillance, d\u00e9sactivation : les 3 piliers d\u2019une strat\u00e9gie de protection anti DDoS<\/h2>\n<p>Pour autant, vous pourriez avoir oubli\u00e9 de r\u00e9pondre \u00e0 un certain nombre de questions cl\u00e9s.<\/p>\n<p>Sur quels crit\u00e8res de d\u00e9tection et \u00e0 quels seuils serez-vous en mesure de passer l\u2019ordre d\u2019activation de la solution ? Serez-vous assez r\u00e9actif pour qu\u2019il ne soit pas trop tard vis-\u00e0-vis des impacts business ? L\u2019\u00e9chelle du temps DDoS est proche du \u00bc d\u2019heure&#8230; Une fois la solution activ\u00e9e, quelles seront les premi\u00e8res actions \u00e0 entreprendre ? Avez-vous identifi\u00e9 ou contr\u00f4lerez-vous les effets de bord qu\u2019elles pourront engendrer sur votre environnement de production ? Faudra-il communiquer aux clients, au r\u00e9seau commercial ? Durant l\u2019attaque, \u00eates-vous certain d\u2019\u00eatre apte \u00e0 communiquer efficacement avec votre prestataire en charge de la solution ? Pourrez-vous ais\u00e9ment constater l\u2019efficacit\u00e9 de ses services ? Connait-il votre contexte, votre infrastructure ? Est-il \u00e0 jour des derniers changements pour \u00e9viter une protection partielle ? Par analogie avec l\u2019ordre d\u2019activation, saurez-vous quand et comment d\u00e9cider du retour \u00e0 la normale ? Enfin, avez-vous suffisamment de visibilit\u00e9 pour d\u00e9terminer si l\u2019attaque continue ou non en amont des barri\u00e8res d\u00e9fensives ?<\/p>\n<p>Les retours d\u2019exp\u00e9rience montrent que la mise en place d\u2019une solution protectrice seule, sans r\u00e9ponse \u00e0 l\u2019ensemble de ces questions, ne suffit pas.<\/p>\n<p>Aussi ne faut-il pas se cantonner \u00e0 la simple souscription d\u2019un service de protection : des moyens et des processus de d\u00e9tection, d\u2019activation, de communication, d\u2019arbitrage et retour \u00e0 la normale devront \u00eatre \u00e9labor\u00e9s et r\u00e9guli\u00e8rement exp\u00e9riment\u00e9s. Les actions majeures devront \u00eatre rigoureusement formalis\u00e9es : le d\u00e9clenchement de la solution de protection et le retour \u00e0 la normale (qui d\u00e9cide, qui r\u00e9alise, sur quelles informations, avec quelle r\u00e9activit\u00e9\u2026). Par ailleurs, le volet surveillance et gestion de crise pendant l\u2019attaque ne doit pas \u00eatre n\u00e9glig\u00e9 (quels moyens pour v\u00e9rifier que l\u2019attaque a toujours lieu, avec quel effet, quels seuils\/indicateurs pour d\u00e9clencher les escalades).<\/p>\n<h2>Tests et exercices : les garant de la bonne gestion d\u2019une attaque DDoS<\/h2>\n<p>Au-del\u00e0 de la formalisation, trois types de tests s\u2019av\u00e8rent indispensables.<\/p>\n<p>Les plus simples sont les tests de \u00ab bascule \u00e0 vide \u00bb : sans contrainte de temps particuli\u00e8re, il s\u2019agit de mettre en action les diff\u00e9rents modes op\u00e9ratoires li\u00e9s \u00e0 l\u2019activation, au maintien ou \u00e0 la d\u00e9sactivation de la solution de protection. Au-del\u00e0 de permettre la formation des \u00e9quipes concern\u00e9es, ces tests permettent de juger la qualit\u00e9 des proc\u00e9dures techniques ; ils permettront \u00e9galement leur am\u00e9lioration continue afin d\u2019assurer au mieux leur efficacit\u00e9 en cas d\u2019attaque.<\/p>\n<p>Des tests de \u00ab bascule en conditions r\u00e9elles \u00bb sont ensuite requis : \u00e0 l\u2019oppos\u00e9 de la \u00ab bascule \u00e0 vide \u00bb, une attaque simul\u00e9e sera ici commandit\u00e9e aupr\u00e8s d\u2019un organisme tiers afin que les \u00e9quipes techniques puissent s\u2019exercer en conditions r\u00e9elles. Les m\u00eames modes op\u00e9ratoires techniques seront mis \u00e0 l\u2019\u00e9preuve, dans un objectif cependant diff\u00e9rent : le respect des \u00e9ch\u00e9ances th\u00e9oriques.<\/p>\n<p>Des exercices de \u00ab gestion de crise \u00bb sont \u00e9galement \u00e0 pr\u00e9voir. Compl\u00e9mentaires des deux premi\u00e8res s\u00e9ries ci-dessus, il s\u2019agit l\u00e0 de se focaliser sur l\u2019exp\u00e9rimentation de la gestion de crise et non sur les aspects techniques. Ces tests permettront de juger la qualit\u00e9 de la gestion en r\u00e9pondant notamment aux bonnes questions en dehors de la sph\u00e8re technique et en int\u00e9grant la communication, le juridique ou encore la relation clients. Chaque t\u00e2che trouve-t-elle rapidement son porteur ? L\u2019ordonnancement pr\u00e9vu est-il respect\u00e9 ? Les moyens n\u00e9cessaires sont-ils accessibles (mat\u00e9riels, salles, interlocuteurs, etc.) ? Les r\u00f4les pr\u00e9d\u00e9finis de chacun sont-ils connus de tous et \u00e0 l\u2019avance ? La remont\u00e9e des informations au Responsable de crise est-elle correctement r\u00e9alis\u00e9e ?<\/p>\n<p>Les solutions techniques ne peuvent suffire \u00e0 g\u00e9rer toutes les composantes d\u2019une attaque DDos. N\u00e9cessaire et compl\u00e9mentaire, la mise en place d\u2019une organisation interne apte \u00e0 g\u00e9rer l\u2019attaque et la crise doit \u00eatre consid\u00e9r\u00e9e par les entreprises pour se prot\u00e9ger correctement et efficacement.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depuis quelques ann\u00e9es, les attaques par d\u00e9ni de service distribu\u00e9 (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es ; leur facilit\u00e9 d\u2019acc\u00e8s et d\u2019usage, leur efficacit\u00e9 prouv\u00e9e et leur grande vari\u00e9t\u00e9 les propulsent aujourd\u2019hui en t\u00eate des tactiques de diversion et&#8230;<\/p>\n","protected":false},"author":176,"featured_media":6067,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[1712,183,3320],"coauthors":[1177,1076],"class_list":["post-5949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-attaque-ddos","tag-cybercriminalite","tag-incident-response-cert-w"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lutte anti-DDoS : la technique ne suffit pas, organisons-nous ! - RiskInsight<\/title>\n<meta name=\"description\" content=\"Depuis quelques ann\u00e9es, les attaques DDoS (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es. Les entreprises s&#039;interrogent sur les moyens de protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous ! - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Depuis quelques ann\u00e9es, les attaques DDoS (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es. Les entreprises s&#039;interrogent sur les moyens de protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-07T09:34:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:09:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Baptistin Buchet, Ali Fawaz\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Baptistin Buchet, Ali Fawaz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/\"},\"author\":{\"name\":\"Baptistin Buchet\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16aec9608a95cf2d00a82212bf85ea4d\"},\"headline\":\"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !\",\"datePublished\":\"2014-11-07T09:34:34+00:00\",\"dateModified\":\"2019-12-31T10:09:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/\"},\"wordCount\":946,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg\",\"keywords\":[\"attaque DDoS\",\"Cybercriminalit\u00e9\",\"incident response CERT-W\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/\",\"name\":\"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous ! - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg\",\"datePublished\":\"2014-11-07T09:34:34+00:00\",\"dateModified\":\"2019-12-31T10:09:27+00:00\",\"description\":\"Depuis quelques ann\u00e9es, les attaques DDoS (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es. Les entreprises s'interrogent sur les moyens de protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg\",\"width\":1500,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16aec9608a95cf2d00a82212bf85ea4d\",\"name\":\"Baptistin Buchet\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/baptistin-buchet\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous ! - RiskInsight","description":"Depuis quelques ann\u00e9es, les attaques DDoS (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es. Les entreprises s'interrogent sur les moyens de protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/","og_locale":"en_US","og_type":"article","og_title":"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous ! - RiskInsight","og_description":"Depuis quelques ann\u00e9es, les attaques DDoS (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es. Les entreprises s'interrogent sur les moyens de protection.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/","og_site_name":"RiskInsight","article_published_time":"2014-11-07T09:34:34+00:00","article_modified_time":"2019-12-31T10:09:27+00:00","og_image":[{"width":1500,"height":1125,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg","type":"image\/jpeg"}],"author":"Baptistin Buchet, Ali Fawaz","twitter_misc":{"Written by":"Baptistin Buchet, Ali Fawaz","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/"},"author":{"name":"Baptistin Buchet","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16aec9608a95cf2d00a82212bf85ea4d"},"headline":"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !","datePublished":"2014-11-07T09:34:34+00:00","dateModified":"2019-12-31T10:09:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/"},"wordCount":946,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg","keywords":["attaque DDoS","Cybercriminalit\u00e9","incident response CERT-W"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/","name":"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous ! - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg","datePublished":"2014-11-07T09:34:34+00:00","dateModified":"2019-12-31T10:09:27+00:00","description":"Depuis quelques ann\u00e9es, les attaques DDoS (Distributed Denial of Service) se sont d\u00e9mocratis\u00e9es. Les entreprises s'interrogent sur les moyens de protection.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/maxkabakov-Fotolia.com_.jpg","width":1500,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/11\/lutte-anti-ddos-technique-suffit-pas-organisons\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16aec9608a95cf2d00a82212bf85ea4d","name":"Baptistin Buchet","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/baptistin-buchet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/176"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5949"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5949\/revisions"}],"predecessor-version":[{"id":6068,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5949\/revisions\/6068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6067"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5949"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}