Overview of DDoS attack.

Distributed Denial of Service (DDoS) attacks are no longer a rarity in cyberspace. As the name suggests, DDoS attacks are performed from many different sources, aiming to prevent an online service (EC, portal, web…) from working. Starting from the little pranks of hackers, DDoS network attacks quickly became a business tool of black individuals and companies and then became a tool for political purposes among the public. different forces and is becoming a real weapon (warfare)

One of the first examples was the DDoS attacks of several Gbps on the occasion of Aung San Suu Kyi’s election in 2010 that paralyzed Myanmar’s network for days. In another example, Estonia’s infrastructure suffered several pre-emptive blows during the 2007 war. Or more recently, a DDoS attack on the servers of Dyn (a company that manages many of the Internet’s important domains). ) October 2016 was said to have crossed the 1 Tbit/s threshold, shutting down the Internet for a period of time.

In business, attacking rival websites with DDoS is no longer a strange thing. As for gamers, directly attacking the opponent or the opponent’s server used to take advantage of the time to get the rare item (item) is also said to be used by some malicious gamers. If there is demand, there is supply. Nowadays, one can easily get services that offer DDoS attacks. These services often allow customers to try the “product” before using it. A DDoS attack under 1 hour can be “ordered” and executed in under 10 minutes for less than $59. That could be the main reason why more than 80% of DDoS attacks in 2016 were shorter than 60 minutes (according to Arbor Networks).

The magnitude of attacks has increased dramatically in recent years. With leveraged amplification techniques and the rapid development of the infrastructure system, several dozen Gpbs are no longer rare. IoT devices that are not properly secured have played a large role in the creation of attacks of several hundred Gbps scale.

Leave a Reply

Your email address will not be published. Required fields are marked *