SHARE
Facebook X Pinterest WhatsApp

SiEM: A Complementary Approach to Addressing DDoS

thumbnail
SiEM: A Complementary Approach to Addressing DDoS

The DDOS - Distributed Denial Of Service - hackers attack. 3D rendered Illustration.

SiEMs are increasingly playing a role in identifying precursors to DDoS attacks and in helping mitigate the root causes of those attacks.

Apr 12, 2022

Security information and event management (SiEM) systems have long been relied on to support threat detection, compliance, and security incident management. Traditionally, using SiEMs has not been the primary method security analysts and SecOps teams have gone to when dealing with distributed denial of service (DDoS) attacks. But as the impact of DDoS attacks grows, SiEMs are increasingly playing a role in identifying precursors to attacks and in helping mitigate the root causes of those attacks.

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics

DDoS attacks are getting much more attention now. While DDoS attacks can be launched against any target, there is increasing concern about attacks against government entities and critical infrastructure. This is especially true as DDoS is likely to be an element of cyber warfare now and into the future.

See also: Continuous Intelligence Insights

Additionally, the rapidly growing number of smart devices and IoT devices, many of which are inadequately secured, offers malicious actors new opportunities. Compromising a network of such devices gives cybercriminals yet another attack vector. 

Traditionally, the main defense against DDoS attacks has been of a more reactive nature. When a malicious actor launched an attack, organizations would either shut down the links bringing in the high volume of traffic or perhaps rely on a content delivery network partner to help prevent the traffic surge from impacting their sites and servers.

The problem with that approach is that actions are taken after an attack is launched. A better approach would be to identify the telltale signs of a DDoS attack before they impact an organization and automatically take steps to mitigate the issue.

How can SiEMs help? SiEMs collect and analyze (both near real-time and historical) security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting).

A SiEM tool could be used to detect different types of DDoS attacks using its incident detection engine. Additionally, if the tool has an inference engine, it could be used to automatically infer potential countermeasures to respond to and recover from DDoS attacks. Such an inference system would need to continuously reason for each reported incident and provide suggestions to keep the system stable.

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics
thumbnail
Salvatore Salamone

Salvatore Salamone is a physicist by training who writes about science and information technology. During his career, he has been a senior or executive editor at many industry-leading publications including High Technology, Network World, Byte Magazine, Data Communications, LAN Times, InternetWeek, Bio-IT World, and Lightwave, The Journal of Fiber Optics. He also is the author of three business technology books.

Recommended for you...

Mission-Critical AI: When Failure Isn’t an Option for Service Professionals
Assaf Melochna
Nov 25, 2025
When AI Starts Seeing and Hearing, IT Must Start Rethinking
Derek Ashmore
Nov 11, 2025
The Dawn of the Ticketless Enterprise: Revolutionizing IT Management
Ugo Orsi
Oct 26, 2025
AI’s Impact on Enterprise Networking
Jamie Pugh
Aug 26, 2025

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.