{"id":146,"date":"2016-04-30T10:15:00","date_gmt":"2016-04-30T10:15:00","guid":{"rendered":"https:\/\/www.7sec.com\/blog\/?p=146"},"modified":"2021-06-10T13:20:12","modified_gmt":"2021-06-10T13:20:12","slug":"fight-back-with-ddos-mitigation","status":"publish","type":"post","link":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/","title":{"rendered":"Fight Back with DDoS Mitigation"},"content":{"rendered":"\r\n<p>Have you ever experienced having a server being overloaded by incoming traffic, or how would we call it \u2013 a denial of service? It\u2019s one of the most common cyber attacks and it aims to shut down one\u2019s online systems.<\/p>\r\n\r\n\r\n\r\n<p>DDoS (Distributed Denial of Service) is an attack on the computer system aiming at bringing the system to a failure, i.e., the creation of conditions under which legitimate users cannot access the victimized resource. In addition to its direct purpose \u2013 resource unavailability and failure of the targeted system, it can be used to take steps towards mastering the system (in contingencies it may provide critical content \u2013 for example, the version of the code, etc.) or to mask other subsequent attacks.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">TYPES OF DDOS ATTACKS<\/h4>\r\n\r\n\r\n\r\n<p>DDoS attacks can be divided into two basic types: attack on the channel and attack on the process, the first of which is just hammered with an overwhelming mass of specially crafted requests, whereas the second is an exploiting software and network protocol vulnerabilities, causing limited productivity of hardware, thus blocking customers\u2019 access to information system resources.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-148\" src=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png\" alt=\"\" width=\"530\" height=\"198\" srcset=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png 800w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3-300x112.png 300w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3-768x287.png 768w\" sizes=\"auto, (max-width: 530px) 85vw, 530px\" \/><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">HOW DO THINGS WORK?<\/h4>\r\n\r\n\r\n\r\n<p>The network DDoS attack type is usually carried out by means of a botnet (zombie networks). The botnet consists of a large number of computers infected with special malware. Usually, the computers are used without the consent or knowledge of their owners. The botnet is commanded from the control center (by the attacker) to start sending many specially forged requests to the target computer. When the requests consume the available resources, access to legitimate users is blocked.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">TYPES OF DDoS MITIGATION SOLUTIONS<\/h4>\r\n\r\n\r\n\r\n<p>Cloud Protection \u2013 Service providing DDoS attack protection based on the provider\u2019s infrastructure. All traffic is redirected to the proxy of the provider, where traffic is filtered and sent back cleansed from DDoS traffic.<\/p>\r\n\r\n\r\n\r\n<p><strong>ADVANTAGES<\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>No need to invest in special equipment, uplinks, training, etc.;<\/li>\r\n<li>Freedom and availability in the choice of a supplier;<\/li>\r\n<li>Diversification of the hosting and protection against DDoS attacks;<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong>THE DOWNSIDE<\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Lack of complete control over what is happening;<\/li>\r\n<li>Unreliable information on attack situation from vendor;<\/li>\r\n<li>Traffic is redirected for filtering outside the customer\u2019s infrastructure;<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>On-Site Protection \u2013 protection on the perimeter of the customer\u2019s own infrastructure using specialized equipment \u2013 devices acting as a filter to all ingress traffic enters client\u2019s network.<\/p>\r\n\r\n\r\n\r\n<p><strong>ADVANTAGES<\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Exercise total control over the mitigation process;<\/li>\r\n<li>A comprehensive view of the attack;<\/li>\r\n<li>No traffic is redirected for filtering outside the customer\u2019s infrastructure;<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p><strong>THE DOWNSIDE<\/strong><\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Considerable investment in special equipment, uplinks, training, etc.;<\/li>\r\n<li>Protection is limited to an uplink capacity;<\/li>\r\n<li>Need to maintain a crew of trained professionals 24\/7.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">Why is professional mitigation necessary?<\/h4>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Using your own existing Equipment? Routers and switches will fold under the load, due to insufficient capacity to deal with DDoS. Stateful in-line Firewalls and ISP\u2019s are not designed to mitigate such attacks \u2013 if they can withstand the flood at all, packets simply pass through them.<\/li>\r\n<li>Software solutions that don&#8217;t work: the likes of mod_evasive, iptables, Apache \/ LiteSpeed tuning, kernel tuning are not capable of handling attack size or complexity, thus being useful on a very limited number of occasions.<\/li>\r\n<li>ISP\u2019s won\u2019t help. Your service provider has one way to \u201chelp\u201d and that\u2019s to null-route your traffic for a period of their own discretion. You may even get banned for suffering a DDoS attack and bringing others on the shared resource down.<\/li>\r\n<li>Who do you block? Massive numbers of IPs are attacking you, seems the whole world is after your resource. You need to block all attacking IPs and allow only the good ones. Can you do that? And how?<\/li>\r\n<li>Human-like attack behavior. It\u2019s not just the sheer flood you\u2019re dealing with. L7 attacks mimic the behavior of real users, thus eating CPU and RAM.<\/li>\r\n<li>Bandwidth is not enough to mitigate. Feasibility is important when provisioning bandwidth. How much do you need, and how much can you afford? Is it worth it?<\/li>\r\n<li>Is your team up to speed? With changing attack methods, your team needs to be able to roll with the punches \u2013 tweaking defenses, finding solutions. Can they do that? Quickly?<\/li>\r\n<li>Can you isolate the victim? DDoS attacks inflict collateral damage. When you can\u2019t isolate the victim of an attack, the others on the network suffer too.<\/li>\r\n<li>Insufficient insight into attack details. You only see the symptoms, without attack details you don\u2019t know the cause nor the solution.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">THINGS TO LOOK FOR WHEN PROCURING MITIGATION SOLUTIONS<\/h4>\r\n\r\n\r\n\r\n<p>When you have chosen a good cloud DDoS Mitigation service you will benefit from:<\/p>\r\n\r\n\r\n\r\n<p>Mitigation Invisibility \u2013 Depending on the DDoS attack type, the vendor must use different bot verification methods, with at least the larger majority of them being almost completely invisible to your visitors, so they don\u2019t \u201cfeel\u201d the mitigation a hindrance.<\/p>\r\n\r\n\r\n\r\n<p>Search Engine Friendly\u00a0\u2013 It is important to understand that your website needs to remain visible to search engines, so the vendor must provide full support for the most popular search engines. Also, being open to requests for additional search engine support is a plus.<\/p>\r\n\r\n\r\n\r\n<p>Multi-Gigabit Protection\u00a0\u2013 Sizable network channels distributed over multiple Points of Presence around the world, empowering the mitigation solution to provide performance and scalability to keep the protected resource going.<\/p>\r\n\r\n\r\n\r\n<p>Multiple Points of Presence\u00a0\u2013 In order to ensure the lowest latency and lag times globally, the vendor will have placed Points of Presence (PoP) in strategic locations announced with BGP Anycast, thus ensuring your visitors\u2019 traffic goes to the cleansing center that is the geographically closest.<\/p>\r\n\r\n\r\n\r\n<h4>And the rules of thumb for <strong>On-Site DDoS Mitigation<\/strong>\u2026<\/h4>\r\n\r\n\r\n\r\n<p>While so-called proxy shield vendors are abundant, a contemporary market supply of on-premise solutions is represented by a handful of manufacturers and software developers, each claiming to have the best product for meaningful, cost-effective DDoS mitigation.<\/p>\r\n\r\n\r\n\r\n<p>On-premise DDoS Mitigation solutions provided by today\u2019s vendors consist of server boxes of one to several U\u2019s, which one is expected to place in their data center, switch on and watch them do the job. Unfortunately, that\u2019s not always efficient against all floods, as 98% of today\u2019s DDoS attacks can be mitigated automatically with hardware, but the remaining 2% require qualified human intervention. Why is that? DDoS methods are constantly changing to find new vulnerabilities in OS, Browser, and Protocol execution. As it happens, predefined counter-measure strategies don\u2019t always work, and attack floods do get past the mitigation device.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">THE BOX<\/h4>\r\n\r\n\r\n\r\n<p>Constant care \u2013 The best vendor will offer not just the hardware, but you will also benefit from round-the-clock care so you\u2019re never alone when a new type of flood arrives. The vendor will be able to intervene in times of need, and place a global monitoring system at your disposal to make sure your content is available to the world.<\/p>\r\n\r\n\r\n\r\n<p>Custom integration\u00a0\u2013 The vendor engineers must assess your needs and current or planned network structure. They must ensure the best fit in your specific scenario, so you get the most out of the \u201cBox\u201d. Look for vendors that have the knowledge and expertise to do that and gladly place it at your disposal.<\/p>\r\n\r\n\r\n\r\n<p>Flexible manning\u00a0\u2013 A good vendor will man your protection stack with dedicated remote intervention engineers. Alternatively, you must be able to train your own people to monitor and effectively fend off DDoS attacks \u2013 the vendor must offer initial and interim training courses for your staff.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">THE PRICE<\/h4>\r\n\r\n\r\n\r\n<p>TCO spread over time\u00a0\u2013 Instead of spending USD 1\/2M on heartless hardware in one go, you should be able to spread the cost over easy, affordable monthly payments. You want to be protected without it costing you an arm and a leg, with pricing based on affordable monthly installments to cover hardware, support, upgrade\/update, and manning requirements.<\/p>\r\n\r\n\r\n\r\n<p>Tailored support\u2013 Flexibility in choosing comfort level in receiving and paying for support is an important aspect of choosing a product or service. Most vendors will give you preset levels of support, while a good vendor, will estimate your support requirements and offer you only what you need, when you need it.<\/p>\r\n\r\n\r\n\r\n<p>Upgrades &amp; updates\u00a0\u2013 Total Cost of Ownership (TCO) can be tricky \u2013 usually, you\u2019d have to pay for the initial hardware\/software configuration and then factor in the upgrade, maintenance, and update expenditures. A good vendor makes it easy and transparent to assess your TCO.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">THE OPTIONS<\/h4>\r\n\r\n\r\n\r\n<p>Failover &amp; redundancy \u2013 With DDoS attacks, it is not uncommon to see criminals increase flood magnitude when faced with successful mitigation at first, thus you may have to deal with a situation where the \u201cBox\u201d is not the weak point in your setup, but your own uplink capacity. For those times, when you can\u2019t wait to upgrade your uplink, a versatile vendor will offer to switch you over to their global proxy protection service (if they have one).<\/p>\r\n\r\n\r\n\r\n<p>Linear scalability\u00a0\u2013 A good \u201cBox\u201d comes preconfigured to protect your entire inbound channel from all types of DDoS attacks. Optionally, larger modules should be available so you can increase the capacity by adding additional mitigation modules that feature linear scalability in protection power. Instead of having to replace the entire solution with a more powerful one in order to meet your needs, a good vendor gives you a Lego-like approach to building your defenses as high as you require by simply adding perfectly integrated modules on top of your existing protection configuration.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Have you ever experienced having a server being overloaded by incoming traffic, or how would we call it \u2013 a denial of service? It\u2019s one of the most common cyber attacks and it aims to shut down one\u2019s online systems. DDoS (Distributed Denial of Service) is an attack on the computer system aiming at bringing &hellip; <a href=\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Fight Back with DDoS Mitigation&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[129,127,125,100,126,130,109,128],"class_list":["post-146","post","type-post","status-publish","format-standard","hentry","category-integration","tag-cloud-ddos-mitigation","tag-cloud-protection","tag-cyber-attack","tag-ddos","tag-ddos-attacks","tag-ddos-mitigation","tag-distributed-denial-of-service","tag-on-site-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fight Back with DDoS Mitigation - Information Security Blog - 7Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fight Back with DDoS Mitigation - Information Security Blog - 7Security\" \/>\n<meta property=\"og:description\" content=\"Have you ever experienced having a server being overloaded by incoming traffic, or how would we call it \u2013 a denial of service? It\u2019s one of the most common cyber attacks and it aims to shut down one\u2019s online systems. DDoS (Distributed Denial of Service) is an attack on the computer system aiming at bringing &hellip; Continue reading &quot;Fight Back with DDoS Mitigation&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security Blog - 7Security\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-30T10:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T13:20:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png\" \/>\n<meta name=\"author\" content=\"madmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"madmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/\",\"url\":\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/\",\"name\":\"Fight Back with DDoS Mitigation - Information Security Blog - 7Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png\",\"datePublished\":\"2016-04-30T10:15:00+00:00\",\"dateModified\":\"2021-06-10T13:20:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/#primaryimage\",\"url\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png\",\"contentUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png\",\"width\":800,\"height\":299},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\",\"url\":\"https:\/\/www.7sec.com\/blog\/\",\"name\":\"Information Security Blog - 7Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.7sec.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\",\"name\":\"madmin\",\"sameAs\":[\"https:\/\/www.7sec.com\/blog\"],\"url\":\"https:\/\/www.7sec.com\/blog\/author\/madmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fight Back with DDoS Mitigation - Information Security Blog - 7Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/","og_locale":"en_US","og_type":"article","og_title":"Fight Back with DDoS Mitigation - Information Security Blog - 7Security","og_description":"Have you ever experienced having a server being overloaded by incoming traffic, or how would we call it \u2013 a denial of service? It\u2019s one of the most common cyber attacks and it aims to shut down one\u2019s online systems. DDoS (Distributed Denial of Service) is an attack on the computer system aiming at bringing &hellip; Continue reading \"Fight Back with DDoS Mitigation\"","og_url":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/","og_site_name":"Information Security Blog - 7Security","article_published_time":"2016-04-30T10:15:00+00:00","article_modified_time":"2021-06-10T13:20:12+00:00","og_image":[{"url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png","type":"","width":"","height":""}],"author":"madmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"madmin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/","url":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/","name":"Fight Back with DDoS Mitigation - Information Security Blog - 7Security","isPartOf":{"@id":"https:\/\/www.7sec.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/#primaryimage"},"image":{"@id":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png","datePublished":"2016-04-30T10:15:00+00:00","dateModified":"2021-06-10T13:20:12+00:00","author":{"@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.7sec.com\/blog\/fight-back-with-ddos-mitigation\/#primaryimage","url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png","contentUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2016\/04\/ddos3.png","width":800,"height":299},{"@type":"WebSite","@id":"https:\/\/www.7sec.com\/blog\/#website","url":"https:\/\/www.7sec.com\/blog\/","name":"Information Security Blog - 7Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.7sec.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65","name":"madmin","sameAs":["https:\/\/www.7sec.com\/blog"],"url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/comments?post=146"}],"version-history":[{"count":13,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/146\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/146\/revisions\/329"}],"wp:attachment":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/media?parent=146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/categories?post=146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/tags?post=146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}