BT Altyapısı
BT altyapısı, kurumsal bir BT ortamının varlığı, işletimi ve yönetimi için gerekli olan bileşik donanım, yazılım, ağ kaynakları ve hizmetleri ifade eder.
Mitigation Steps: 1. Identification (Baselines vs Spikes). 2. Rerouting (Anycast/BGP). 3. Filtering (Scrubbing). 4. Post-game analysis. Tools: Cloudflare, AWS Shield, Akamai, Radware.
graph LR
Center["BT Altyapısı"]:::main
Rel_cloud_computing["cloud-computing"]:::related -.-> Center
click Rel_cloud_computing "/terms/cloud-computing"
Rel_virtualization["virtualization"]:::related -.-> Center
click Rel_virtualization "/terms/virtualization"
Rel_devops["devops"]:::related -.-> Center
click Rel_devops "/terms/devops"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5 yaşındaki gibi açıkla
Imagine you have a small pizza shop. Suddenly, 10,000 people call at once just to ask the time, blocking the phone lines so real customers can't order pizza. DDoS mitigation is like having a smart operator who recognizes the fake calls instantly and hangs up on them, while making sure the people who actually want pizza get through to the kitchen.
🤓 Expert Deep Dive
Technically, DDOS mitigation operates at different layers of the 'OSI Model'. 'Volumetric' attacks (L3/L4) attempt to saturate the network bandwidth; these are handled via 'Anycast Routing', which distributes the load across many global servers. 'Protocol' attacks (e.g., SYN Floods) exploit the handshake process of TCP. 'Application Layer' attacks (L7) are the most sophisticated, mimicking human behavior (like refreshing a search page). Mitigation here requires 'Web Application Firewalls' (WAF) that use machine learning to identify 'Bot Signatures'. A critical part of modern defense is 'BGP Flowspec', which allow ISPs to distribute filtering rules across the internet backbone in seconds to block an attack at its source.