Menu
×
   ❮   
HTML CSS JAVASCRIPT SQL PYTHON JAVA PHP HOW TO W3.CSS C C++ C# BOOTSTRAP REACT MYSQL JQUERY EXCEL XML DJANGO NUMPY PANDAS NODEJS DSA TYPESCRIPT SWIFT ANGULAR ANGULARJS GIT POSTGRESQL MONGODB ASP AI R GO KOTLIN SWIFT SASS VUE GEN AI SCIPY AWS CYBERSECURITY DATA SCIENCE INTRO TO PROGRAMMING HTML & CSS BASH RUST

AWS Cloud Tutorial

AWS HOME AWS Intro AWS Cloud Certification AWS Get Started AWS Cloud Computing AWS Cloud Benefits AWS Infrastructure Intro AWS EC2 Intro AWS EC2 Instance Types AWS EC2 Pricing AWS EC2 Scaling AWS EC2 Auto Scaling AWS Elastic Load Balancing AWS Messaging AWS EventBridge AWS SNS AWS SQS AWS Messaging Comparison AWS Serverless AWS Lambda AWS Containers AWS ECS AWS EKS AWS Fargate AWS Additional Compute AWS Infrastructure AWS Regions AWS Availability Zones AWS Edge Locations AWS Provision AWS Provision Services AWS Elastic Beanstalk AWS CloudFormation AWS Networking AWS Connectivity AWS Subnet and Access AWS Global Networking AWS Global Architectures AWS Storage AWS Instance Stores AWS EBS AWS S3 AWS Elastic File System AWS Storage Comparison AWS Databases AWS RDS AWS DynamoDB AWS DynamoDB vs RDS AWS Redshift AWS DMS AWS Additional DB Services AWS AI/ML Intro AWS AI/ML on AWS AWS AI/ML Services AWS Generative AI Intro AWS Generative AI Services AWS Data Analytics AWS Data Pipelines AWS Cloud Security AWS Shared Responsibility AWS User Access AWS Network Protection AWS Data Protection AWS Detection and Response AWS Monitoring & Governance AWS Monitoring Intro AWS CloudWatch AWS CloudTrail AWS Compliance AWS Auditing AWS Organizations AWS Governance AWS Health AWS Trusted Advisor AWS Pricing and Support AWS Free Tier AWS Pricing Concepts AWS Billing Services AWS Support Plans AWS Marketplace AWS Cost Optimization AWS Migration AWS CAF AWS Migration Strategies AWS Migration Services AWS Database Migrations AWS Data Transfer Online AWS Data Transfer Offline AWS Well-Architected Solutions AWS Well-Architected Framework AWS Specialized Services AWS Specialized Use Cases AWS Cloud Practitioner Wrap Up AWS Exam Preparation

AWS Examples

AWS Cloud Exercises AWS Cloud Quiz AWS Certificate

More AWS

AWS Machine Learning AWS Serverless AWS GenAI

Protecting Networks and Applications


Protecting Networks and Applications

Network and application protection is vital for a secure AWS environment. Attackers can overwhelm your applications with excessive traffic, denying service to legitimate users. AWS provides built-in infrastructure protection and specialized security services to prevent and mitigate this unwanted traffic.


Network and Application Protection Video

W3schools.com collaborates with Amazon Web Services to deliver digital training content to our learners.


Common Attack Types

DoS (Denial of Service)

An attacker floods a web application with excessive traffic, preventing legitimate requests from being served.

DDoS (Distributed Denial of Service)

Multiple infected computers (zombie bots) send excessive traffic simultaneously, making attacks harder to block.


Infrastructure Protection

AWS automatically protects against low-level attacks through its global infrastructure spanning Regions, Availability Zones, and edge locations.

  • Security Groups: Filter traffic at the network level using Region-wide capacity
  • Elastic Load Balancing: Handles traffic before your servers, preventing overload
  • AWS Regions: Massive capacity makes them extremely difficult to overwhelm

Protection Services

AWS Shield

Standard: Free, automatic protection against common DDoS attacks with real-time detection and mitigation.

Advanced: Paid service with detailed attack diagnostics, sophisticated DDoS protection, and integration with CloudFront, Route 53, and ELB. Can combine with AWS WAF for custom rules.

AWS WAF

Web application firewall that monitors incoming requests and checks IP addresses against access control lists (ACLs). Blocks requests from known malicious sources while allowing legitimate traffic.


AWS Cloud Exercises

Test Yourself With Exercises

Exercise:

What is the difference between DoS and DDoS?

The difference is that DDoS is a  attack

Start the Exercise


×

Contact Sales

If you want to use W3Schools services as an educational institution, team or enterprise, send us an e-mail:
sales@w3schools.com

Report Error

If you want to report an error, or if you want to make a suggestion, send us an e-mail:
help@w3schools.com

W3Schools is optimized for learning and training. Examples might be simplified to improve reading and learning. Tutorials, references, and examples are constantly reviewed to avoid errors, but we cannot warrant full correctness of all content. While using W3Schools, you agree to have read and accepted our terms of use, cookies and privacy policy.

Copyright 1999-2026 by Refsnes Data. All Rights Reserved. W3Schools is Powered by W3.CSS.