What is a DDos Attack?
Distributed Denial of Service, more commonly known as DDoS, is where a hacker maliciously attacks a network and inundates a site or network with traffic till it comes to a halt.
DDoS is a common practice for hackers, more so hacktivists to bring down organisations and government sites. DDoS has also been known to be used by very competitive rival companies, playing dirty to bring their competitors sites to a halt.
DDoS is often used as a smokescreen to distract IT managers and administrators whilst a malicious code, virus or ransomware is planted behind the scenes.
See more Cyber Security Definitions.
Types of DDos Attacks
DNS Amplification
This is where hacker starts with small queries that use the cloned IP address of the victim. Exploiting vulnerabilities on publicly-accessible DNS (domain name system) servers, the responses inflate into much larger UDP (User Datagram Protocol) packet payloads and overwhelm the targeted servers.
UDP Flood
In this attack, the attacker uses UDP (User Datagram Protocol) IP packets to swamp various ports on a victims network. The targeted system then attempts to match each datagram with an application but is unsuccessful – because of this, the system is overloaded and fails.
DNS Flood
Like UDP flood, this attack is where hackers use mass amounts of UDP packets to exhaust resources on a server – with the goal being to prevent redirects of legitimate incoming requests to DNS zone resources.
Smurf Attack
A Smurf attack exploits a victims IP (Internet Protocol) and ICMP (Internet Control Message Protocol) using a malware called Smurf. It imitates an IP address, then using ICMP, it pings IP addresses on the victim’s network.
Ping of Death
The Ping of Death manipulates IP protocols by sending multiple malicious pings to a specific system or network, overloading the network and grinding it to a halt.
Slowloris
Slowloris targets a web server utilising as a minimal resource as possible. Once connected, Slowloris maintains a stealthy connection for as long as possible using HTTP flooding.
How to Protect Your Business from DDoS?
Let us introduce you to the Advantex ACT (Advanced Cybersecurity Technologies) suite, utilising the industries most intelligent and powerful solutions from the cloud, we can help educate, protect and restore your business from DDoS attacks and any other vulnerabilities online – giving you maximum protection and ultimately empowering you and your workforce into making better and safer day-to-day decisions online.
– Educate
Advantex Educate eliminates your organisation’s human cyber risk and transforms user behaviour into just one simple and easy-to-use solution, all managed in-house here at Advantex.
– Protect
Utilising the industries most intelligent and powerful solutions from the cloud, Advantex Protect gives your business and its users the ultimate protection and peace of mind from online threats, no matter where they are across the globe.
– Restore
Knowing your data and digital assets are in safe hands allows you to focus on what’s most important, your business. With Advantex Restore, you can benefit from safe, secure, and scalable offsite services – including storage, backup and recovery for any data or system, anytime, anywhere.