Distributed Denial of Service (DDoS) attacks are ever growing cyber threat towards internet security and digital infrastructure. DDoS Attacks Basics For a student in the 6th semester of a Bachelor of science program, one should know about basics points about Ddos attacks and its ways if attack, impact: types and Mitigation approaches etc. It explains the DDoS attack clearly and in a structured way that matches your academic level.
What is a DDoS Attack
DDoS attack (Distributed Denial of Service) — it is a malicious attempt to disrupt the normal functioning of a targeted server, service or network by saturating the target or its surrounding infrastructure with a flood of Internet traffic. DDoS (Distributed Denial of Service; or a not generally well-known) Unlike the DoS attack – which rather uses only one source to produce traffic as the result of an attack and then implements it using a single computer, or also the basic principles of systems like a DDoS, they use several compromised computer systems worldwide for generating that amount of traffic. They are typically connected to a botnet —a set of infected systems that serves an attacker.
Its main purpose is to fill the resources of a target service (available bandwidth, CPU or memory) in order to make it unavailable for legitimate users. This may lead to website throttle statues or even total unavailability.
How Do DDoS Attacks Work
The attacker simulate it by initially compromising a number of computers or Internet of Things (IoT) devices through vulnerabilities. These devices are generally turned into so-called “zombies” or bots without effect of the owner. The attacker then orchestrates these bots to send a tsunami amount of traffic, at the same time table, to the server or network of a victim.
This influx of traffic saturates the resources of the target. So server overload, router saturation and bandwidth starvation. This will lead to legitimate requests being delayed or dropped, resulting in a Denial Service for real users.
Types of DDoS Attacks
DDoS attacks can generally be classified based on the layer in the OSI (Open Systems Interconnection) model that they attack:
1. Volume-Based Attacks
The purpose of these attacks is to overwhelm the bandwidth of the site. So you have the traffic amount in bits per seconds bps. These include UDP floods, ICMP floods and a number of different types of spoofed-packet flood attacks. They strive to saturate the network.
2. Protocol Attacks
Protocol attacks target real servers or intermediate communication equipment (such as firewalls and load balancers). Attacks system at the protocol stack exploits it as measured in packets per second (pps). These can be used for instances such as SYN floods, Ping of Death and fragmented packet attacks.
3. Application Layer Attacks
They look at the application layer (Layer 7), where web pages are created on the server and returned as a result of HTTP requests. The purpose is to use up resources to crash the web server. Such could be HTTP floods, Slowloris and zero-day attacks for example.
Impact of DDoS Attacks
DDoS attacks can have far-reaching and devastating consequences:
- Loss of Revenue: [Businesses can lose money because downtime means lost sales, which is particularly devastating for e-commerce sites where uptime really is a matter of life and death.
– Reputation Damage: Multiple outages can lead to loss of trust from the customers and users in case of a company.
- Breaches of the Constitution: Important services included banking, healthcare and government operations could be disrupted endangering public safety.
- Resource Drain: Organizations are forced to expend massive resources on infrastructure and cyberthreat mitigation due to these types of attacks.
Real-World Examples
We have all read articles on the notable DDoS attacks:
- Mirai is the name of a botnet malware that targets Internet of Things devices, and unleashed a massive DDoS attack on Dyn in 2016 significantly disrupting many large companies like Twitter, Netflix and Reddit.
2018 – GitHub faces a DDoS attack of unprecedented size at 1.35 terabits per second; mitigated very rapidly, yet indicative of the growing scale of threat.
DDoS Attacks accurance
1. Estonia Cyber Attacks (2007)
- April 2007
- Estonia
- Details:
One of the first large-scale DDoS attacks targeting government, banks, and
media websites.
2. 🇺🇸 Dyn DNS Attack (2016)
- 21 October 2016
- United States
- Details:
Attack on DNS provider Dyn affected websites like Twitter and Netflix.
3. 🇺🇸 GitHub Attack (2018)
- February 2018
- United States
- Details:
One of the biggest DDoS attacks (1.35 Tbps traffic).
4. New Zealand Stock Exchange Attack (2020)
- August 2020
- New Zealand
- Details:
Stock exchange services were disrupted for multiple days.
Conclusion
Image: DDoS attacks are an ongoing and constantly changing threat in the digital space. Learning their mechanisms, types and impacts are essential for anyone who studies computer science or information technology. With proper detection and mitigation techniques, you can ensure your services are still up even under attack. If you are a student, this will equip you for career paths in cybersecurity and network management, as defending against such threats is becoming more important.