ChaptersEventsBlog
Register now for the December 11 session on the rise of DeepSeek, AI experimentation, and critical security gaps.

Download Publication

Software-Defined Perimeter as a DDoS Prevention Mechanism
Software-Defined Perimeter as a DDoS Prevention Mechanism

Software-Defined Perimeter as a DDoS Prevention Mechanism

Release Date: 10/27/2019

Working Group: Zero Trust

Distributed Denial-of-Service (DDoS) attacks are one of the most prevalent types of cyber attack, and their numbers are only climbing. DDoS attacks are large-scale incursions in which the perpetrator uses more than one unique source IP address (often thousands of them) to launch simultaneous attacks against a target. Organizations should be aware of this threat and on the lookout for the best DDoS mitigation methods.

In this paper by the Zero Trust Working Group, we advocate for Software Defined Perimeter (SDP) as a tool to protect private services from DDoS attacks. SDP is an architecture that provides integrated security, which is otherwise hard to achieve with existing security point products. SDP is efficient and effective against several well-known attacks, including HTTP Flood, TCP SYN, and UDP Reflection.

Key Takeaways:
  • An explanation of DDoS attack vectors and their layers and logical protocols according to the OSI and TCP/IP models
  • An overview of non-SDP mitigation methods
  • The steps for setting up an SDP configured as a DDoS defense mechanism
  • An explanation of three well-known attacks and how to use SDP to defend against them: HTTP Flood, TCP SYN Flood, UDP Reflection
  • A list of DDoS and other attack monitoring maps
Who It’s For:
  • People in security, enterprise architecture, and compliance roles within enterprises
  • Solution providers, service providers, and technology vendors
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Killing Standing Privileges: Why Just-in-Time Access is the Future of PAM
Killing Standing Privileges: Why Just-in-Time Access is the Future ...
Published: 12/04/2025
Navigating the Liminal Edge of AI Security: Deconstructing Prompt Injection, Model Poisoning, and Adversarial Perturbations in the Cognitive Cyber Domain
Navigating the Liminal Edge of AI Security: Deconstructing Prompt I...
Published: 12/01/2025
MCP Can Be RCE for You and Me
MCP Can Be RCE for You and Me
Published: 11/25/2025
The 99% Solution: MFA for Hypervisor Security
The 99% Solution: MFA for Hypervisor Security
Published: 11/18/2025

Interested in helping develop research with CSA?

Related Certificates & Training