DDoS

DDoS stands for Distributed Denial-of-Service. Distributed denial of service. This is a distributed network attack that exploits capacity limitations. Multiple requests to a resource overload the capacity. This article explains how this works and how you can protect yourself against it.

Protection against DDoS attacks

A DDoS attack can be aimed at economic damage, but also at data theft. In any case, it is better to build protection against a DDoS attack.

Due to the easy spread of malware, DDoS attacks are relatively easy for hackers, especially nowadays. The complete interconnectedness through the Internet makes it easier than ever to spread malware and build a zombie network.

Protection against DDoS attacks does not exist purely through antivirus software. Since the attack is not directly a virus or any other type of malware, an antivirus program or a firewall cannot do anything against it.

As mentioned, the attack takes place in the form of numerous, simultaneous requests on a server. To protect the server against this, there are certain protection solutions that specialize in DDoS attacks.

These protection programs sort the incoming traffic on the server and distinguish between genuine requests and the malicious ones. A great advantage of many protection programs is that they can be used only when it is necessary. Thus, they do not need to run permanently. If the traffic on the server becomes unusually high, the program can be used to organize the traffic. Once the attack is over, you turn the program off again. If a server is attacked frequently, simply run the protection program continuously.

Some of the strongest DDoS attacks took place in 2018. In some cases, bundled traffic peaks of up to 1.7 Tbit/s were measured.

Conclusion

Distributed Denial-of-Service – or DDoS – is a massive attack on servers. Sometimes it also takes place on endpoints. The overload can not only be annoying, but can cause entire systems to collapse. The goal is usually to take back the attack in exchange for a payment so that normal operations can continue on the server. However, it is also possible that an attack is only aimed at the damage itself and serves the purpose of manipulation. Proper protection is possible only through special programs.