Skip to main content

What is a DDoS attack?

By October 1, 2021October 14th, 2021Cyber Security

What is a DDoS attack? StratejmWith their surging popularity, you might be surprised to learn that DDoS attacks have actually been around for quite some time and are one of the more crude forms of cyber attack. Despite this, they remain one of the most effective techniques used and are notoriously difficult to stop. With businesses increasingly relying on digital services and remote work, this has created a golden opportunity for cybercriminals to carry out attacks.

Check out below to find out more about DDoS attacks and how they are perpetrated:

What is a DDoS attack?

A Distributed Denial of Service (DDoS) attack occurs when an attacker floods a network or servers of the victim with a wave of traffic so big that their infrastructure gets overwhelmed. The victim’s network is subsequently overloaded by the sheer number of requests, which slows down services or takes them offline completely.

These attacks are usually carried out with a network of internet-connected machines. Attackers take control of various internet connected machines and place them into a botnet – groups of machines under control by the hacker. These botnets are then used for a whole slew of malicious activities, including distributing phishing emails and malware, and can range from a few linked devices to millions of machines at a time.

Types of DDoS Attacks

DDoS attacks will typically target varying components of a network connection, and can largely be divided into three categories:

Application Layer: 

These types of attacks occur in OSI layer 7, and typically target the layer where web pages are generated on the server and delivered in response to HTTP requests. This is similar to pressing refresh in a web browser over and over again, but on a massive scale with thousands of computers at once – Eventually, the sheer number of requests floods the server and denies service delivery for anyone else. Examples of application layer attacks include ICMP, UDP and spoofed-packet flood attacks.

Protocol Attacks:

Also known as state-exhaustion attacks, these kinds of attacks are intended to cause a service disruption by over-consuming server resources like firewalls and load balancers. These attacks occur in OSI layer 3 and 4, and include SYN flood and Smurf DDoS attacks.

Volumetric Attacks:

These attacks attempt to create congestion by consuming all available bandwidth between the target and the larger internet. In other words, attackers flood applications with maliciously crafted fake requests that take huge amounts of resources to process. 

Guidelines for DDoS Attack Response & Mitigation

Blackhole Routing:

Although not necessarily ideal, one solution that is always available is to create a blackhole route and funnel traffic into it. In its most basic form with no specific criteria set, both legitimate and malicious networks are routed into a null route and essentially dropped from the network. This obviously is not ideal as it essentially gives the attacker what they wanted in the first place – blocked network access.

Rate Limiting:

Rate limiting involves limiting the number of requests a server will accept over a certain time window. This is useful in slowing scrapers from stealing content and for mitigating brute force attempts, but will not be sufficient along in handling a complex DDoS attack.

Web Application Firewall:

Web Application Firewalls (WAF) can assist in dealing with layer 7 (application) attacks. The WAF is placed between the internet and the victim and acts as a proxy by protecting the target server from certain types of malicious traffic. These systems usually filter requests based on a series of rules used to identify DDoS attackers.

Content Delivery Network:

A Content Delivery Network (CDN) is a group of geographically distributed proxy servers used for DDoS mitigation. This network acts as a single unit and works to provide content quickly via multiple backbone and WAN connections. In the case that one network is flooded with traffic, the CDN can deliver content from another group of unaffected networks.                 

Work with a MSSP

The best way to get comprehensive protection against DDoS attacks is through partnering with a reputable cybersecurity company like Stratejm. We provide comprehensive, turnkey, enterprise-grade security from our next-generation security as a service platform. 

Contact us to find out more.