{"id":9606,"date":"2021-05-08T20:03:25","date_gmt":"2021-05-08T18:03:25","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=9606"},"modified":"2021-05-08T20:50:14","modified_gmt":"2021-05-08T18:50:14","slug":"guide-anssi-attaque-ddos","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=9606","title":{"rendered":"Comprendre et anticiper les attaques DDoS"},"content":{"rendered":"<p style=\"text-align: justify;\">Les attaques par d\u00e9ni de service distribu\u00e9 (<em>Distributed Denial of Service<\/em> ou DDoS) sont aujourd\u2019hui fr\u00e9quentes, notamment du fait de la relative simplicit\u00e9 de leur mise en oeuvre, et de leur efficacit\u00e9 contre une cible non pr\u00e9par\u00e9e. Ces attaques peuvent engendrer des pertes financi\u00e8res non n\u00e9gligeables par l\u2019interruption de service ou encore indirectement, par l\u2019atteinte port\u00e9e \u00e0 l\u2019image de la cible.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9607\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2021\/05\/DDoS-ANSSI.png\" alt=\"DDoS ANSSI\" width=\"654\" height=\"539\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2021\/05\/DDoS-ANSSI.png 654w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2021\/05\/DDoS-ANSSI-300x247.png 300w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><br \/>\nPour cette raison, il est n\u00e9cessaire d\u2019anticiper cette menace, et de prendre un certain nombre de mesures techniques et organisationnelles afin d\u2019y faire face.<\/p>\n<p style=\"text-align: justify;\">L&#8217;ANSSI (Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d&#8217;Information) a publi\u00e9 un document qui pr\u00e9sente les attaques par d\u00e9ni de service distribu\u00e9 ainsi que la liste des \u00e9l\u00e9ments \u00e0 prendre en compte afin de s\u2019en prot\u00e9ger. Par ailleurs, le dernier chapitre du document rappelle les bonnes pratiques \u00e0 mettre en oeuvre afin de ne pas participer involontairement \u00e0 une attaque DDoS.<\/p>\n<p style=\"text-align: justify;\">Ce document, t\u00e9l\u00e9chargeable ci-apr\u00e8s et sur le site de l&#8217;ANSSI, est principalement destin\u00e9 aux responsables de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information des soci\u00e9t\u00e9s et organismes clients d\u2019op\u00e9rateurs de transit ou de fournisseurs d\u2019acc\u00e8s \u00e0 Internet, et cherchant \u00e0 se prot\u00e9ger contre les attaques DDoS.<\/p>\n<p>Tous les <a href=\"https:\/\/www.auditsi.eu\/?tag=anssi\">articles en rapport avec l&#8217;ANSSI<\/a>. Site de l&#8217;<a href=\"https:\/\/www.ssi.gouv.fr\/\" target=\"_blank\" rel=\"noopener\">ANSSI<\/a>.<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Comprendre%20et%20anticiper%20les%20attaques%20DDoS\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>L\u2019ANSSI (Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information) a publi\u00e9 un document qui pr\u00e9sente les attaques par d\u00e9ni de service distribu\u00e9 ainsi que la liste des \u00e9l\u00e9ments \u00e0 prendre en compte afin de s\u2019en prot\u00e9ger. Par ailleurs, le dernier chapitre du document rappelle les bonnes pratiques \u00e0 mettre en oeuvre afin de ne pas participer involontairement \u00e0 une attaque DDoS.<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Comprendre%20et%20anticiper%20les%20attaques%20DDoS\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[36,35,30,24,33],"tags":[1076,2182,731,2324,2493,2494,99,864,1125,198,2495],"class_list":["post-9606","post","type-post","status-publish","format-standard","hentry","category-protection-des-donnees","category-securite-informatique","category-sites-internet","category-systeme-dinformation","category-systeme-informatique","tag-anssi","tag-attaque-ddos","tag-atteinte-au-secret-daffaires","tag-cybersecurite","tag-ddos","tag-deni-de-service","tag-faille-de-securite","tag-interruption","tag-reseau-informatique","tag-strategie-de-securite","tag-victime"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/9606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9606"}],"version-history":[{"count":3,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/9606\/revisions"}],"predecessor-version":[{"id":9613,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/9606\/revisions\/9613"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}