Shortly after the investigation begins, the client is provided with details of the botnet including the geographical location of the perpetrator of the DDoS attack. Based on this information, the client will then be able to assess the feasibility of pursuing legal action or criminal prosecution. In the event that the attacker seeks to extort from the client, DSS will compile the necessary information so as to pursue a legal prosecution. Compiling the appropriate documentation in a professional manner will make it easier to track down the offender.
A distributed denial of service (DDoS) attack poses a threat to Internet-based resources by impeding or denying functionality to the intended user. However, DSS is able to respond quickly in order to contain the threat, with experts on hand to provide investigative services to assist in identifying the culprits.
DSS determines the identities and physical locations of the persons controlling the botnet or servers used in the DDoS attack. The identity of the attack’s initiator may only be determined after the successful identification of the executor. At the conclusion of all activities, the client is presented with a comprehensive report.
Only once the details of the executor have been revealed is it possible to then expose the identity and geographical location of the offender controlling the botnet or servers used in the DDoS attack. Not only is DSS able to identify these persons, the company then presents an wide-ranging report to the client which details the restored event timeline; analysis of each stage of the investigation along with the relevant documentary evidence; the identity and geographical location of the executor of the DDoS attack; as well as advice regarding the possibility of further legal proceedings.
The company is currently developing a system to combat international cyber crime, which will equip the law enforcement authorities in any jurisdiction to effectively tackle the problem of computer-based malfeasance. Crucially, the technology assists at the most problematic stages of the criminal investigation, including the assemblage of evidence, DDoS protection and web auditing.