What is a DDoS Attack?
DDoS, short for distributed-denial-of-service, is a cyberattack that attempts to interrupt a server or network by flooding it with fake internet traffic, preventing user access and disrupting operations.
The purpose of a DDoS attack is to disrupt the ability of an organization to serve its users. Malicious actors use DDoS attacks for:
- competitor sabotage
- insider revenge
- nation-state activities
- mayhem/chaos
What Is the Difference Between DDoS and DoS Attacks?
The main difference between a DDoS attack and a DoS attack is the origin of the attack. DDoS attacks are launched from multiple systems, while DoS (denial-of-service) attacks originate from just one system. DDoS attacks are faster and harder to block than DOS attacks. DoS attacks are easier to block because there is only one attacking machine to identify.
How Does a DDoS Attack Work?
It is impossible to discuss DDoS attacks without discussing botnets. A botnet is a network of computers infected with malware that enables malicious actors to control the computers remotely. These botnets are “distributed” because they may be located anywhere and belong to anyone. Innocent owners of infected computers may never know their systems are part of a botnet.
After building a massive botnet of millions of compromised devices, a DDoS attacker remotely directs each bot to send requests to the target’s IP address. The goal is to exceed the capacity limits of the victim’s web resources with an overwhelming number of connection requests or data to ultimately halt their service.
What Are the Signs of a DDoS Attack?
Victims of DDoS attacks usually notice that their network, website, or device is running slowly or is not providing service. However, these symptoms are not unique to DDoS attacks – they can be caused by many things, such as a malfunctioning server, a surge in legitimate traffic, or even a broken cable. That's why you cannot simply rely on manual observations, and instead should leverage a traffic analysis tool to detect distributed denial-of-service attacks.
DDoS Mitigation and Protection
DDoS mitigation and defense requires a multi-pronged approach – no single tool can guarantee complete protection from all types of DDoS attacks. Below are a few basic tools to add to your arsenal:
Risk Assessment:
Companies should employ a proactive approach when protecting against DDoS attacks. The first step is to be aware of all your company’s vulnerabilities and strengths. Conduct risk assessments on all your digital assets (i.e. networks, servers, devices, software) to be prepared with the best mitigation plan when the time comes.
Web Application Firewall (WAF):
A WAF is like a checkpoint for web applications in that it’s used to monitor incoming HTTP traffic requests and filter out malicious traffic. When an application-layer DDoS attack is detected, WAF policies can be quickly changed to limit the rate of requests and block the malicious traffic by updating your Access Control List (ACL).
Security information and event management (SIEM):
A SIEM is a tool that pulls data from every corner of an environment and aggregates it in a single centralized interface, providing visibility into malicious activity that can be used to qualify alerts, create reports and support incident response.
Content Delivery Networks/Load Balancers:
CDNs and load balancers can be used to mitigate the risk of server overload and the subsequent performance/availability issues by automatically distributing traffic influxes across multiple servers.
Blackhole Routing
During blackhole routing, the network administrator pushes all traffic, whether good or bad, through a black hole route. The goal is to drop ALL traffic from the network, which comes with the downside of losing legitimate traffic and potentially some business.
Rate Limiting
Limit the number of service requests your network receives and accepts on a given period of time. It is usually not enough to fight more sophisticated DDoS attacks, so it should be employed alongside other mitigation strategies.