DDoS Attack
Published Jul 22, 2023
Contribute to Docs
A DDoS, or Distributed Denial of Service, is a cyber attack where a company or organization’s websites and servers are overwhelmed by traffic as a result of a coordinated effort by a hacker or group. These individuals often use botnets, devices they hijack without the owners’ knowledge, as a weapon of choice. However, hackers may use other methods, such as amplifying requests to a system that can cause disruptions of service and damages due to the inability of the system(s) to handle the flood of malicious or false requests.
Types of DDOS Attacks
DDoS attacks can be separated into three categories:
- Volumetric(raw attack volume) attacks: Utilizes methods to generate volumes of online traffic to a company’s website, causing its bandwidth to be saturated and destabilizing the flow of online accessibility.
- Protocol attacks: Destroys the processing capacity of network infrastructure resources like servers, firewalls, and load balancers. This happens when malicious connection requests are made through Layer 3 and 4 protocol connection requests.
- Application Attacks: Opens connections and initiating process and transaction requests that consume finite resources like disk space and memory storage. This occurs when weaknesses in the application layer are manipulated.
Signs of a DDOS-infected device
- Slow access to files.
- Unable to access a specific website.
- No internet access.
- Spam emails to contacts.
How to Respond to a DDOS Attack
- Provide training for staff members to recognize the signs of a DDoS attack.
- Use online outage mitigation and response strategies.
- Assess ongoing DDoS risks through tests that mimic these attacks.
- Implement specialized tools that can handle the overflow of high Web traffic. Cloud-based Web servers like AWS Shield are often recommended for this task.
Contribute to Docs
- Learn more about how to get involved.
- Edit this page on GitHub to fix an error or make an improvement.
- Submit feedback to let us know how we can improve Docs.
Learn Cybersecurity on Codecademy
- Skill path
Fundamentals of Cyber Resilience and Risk Management
Learn strategies for risk management and quantitative and qualitative risk analysis and dive deeper into the world of cybersecurity.Includes 6 CoursesWith CertificateBeginner Friendly1 hour - Skill path
Fundamentals of Cybersecurity
Learn the Cybersecurity fundamentals that will lay a foundation for securing your technology and personal life from dangerous cyber threats.Includes 5 CoursesWith CertificateBeginner Friendly3 hours - Free course
Introduction to Cybersecurity
Learn about the fast-growing field of cybersecurity and how to protect your data and information from digital attacks.Beginner Friendly3 hours