Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 291

DDoS Mitigation

What is DDoS Mitigation?

DDoS MitigationDDoS mitigation is the set of techniques and services that absorb, filter, and re-route distributed denial-of-service attacks before they exhaust a target's network, infrastructure, or application capacity.


DDoS mitigation combats attacks at three layers: volumetric floods (SYN, UDP, amplification) measured in Gbps or Tbps, protocol attacks (e.g., SYN-flood, slowloris), and application-layer attacks against HTTP/HTTPS and APIs. Modern providers — Cloudflare, Akamai, Google, AWS Shield, Imperva — terminate traffic at globally distributed anycast scrubbing centers, applying signature, behavioral, and rate-based filters, plus challenge mechanisms for L7. On-prem appliances and BGP flowspec/Remotely Triggered Black Hole (RTBH) remain important for ISPs and large enterprises. Effective mitigation requires runbooks, telemetry baselines, and pre-negotiated burst capacity, since defense must be in place before the attack starts.

Examples

  1. 01

    An anycast scrubbing center absorbs a 2 Tbps UDP-amplification flood at the network edge.

  2. 02

    Rate-limiting and JS challenges blunt an L7 HTTP flood against a checkout endpoint.

Frequently asked questions

What is DDoS Mitigation?

DDoS mitigation is the set of techniques and services that absorb, filter, and re-route distributed denial-of-service attacks before they exhaust a target's network, infrastructure, or application capacity. It belongs to the Network Security category of cybersecurity.

What does DDoS Mitigation mean?

DDoS mitigation is the set of techniques and services that absorb, filter, and re-route distributed denial-of-service attacks before they exhaust a target's network, infrastructure, or application capacity.

How does DDoS Mitigation work?

DDoS mitigation combats attacks at three layers: volumetric floods (SYN, UDP, amplification) measured in Gbps or Tbps, protocol attacks (e.g., SYN-flood, slowloris), and application-layer attacks against HTTP/HTTPS and APIs. Modern providers — Cloudflare, Akamai, Google, AWS Shield, Imperva — terminate traffic at globally distributed anycast scrubbing centers, applying signature, behavioral, and rate-based filters, plus challenge mechanisms for L7. On-prem appliances and BGP flowspec/Remotely Triggered Black Hole (RTBH) remain important for ISPs and large enterprises. Effective mitigation requires runbooks, telemetry baselines, and pre-negotiated burst capacity, since defense must be in place before the attack starts.

How do you defend against DDoS Mitigation?

Defences for DDoS Mitigation typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for DDoS Mitigation?

Common alternative names include: DDoS protection, DDoS scrubbing.

Related terms