What is a DDOS attack and how to avoid it

what is ddos attack and how to avoid it.

Many of us have read and heard many times about DDOS attacks (denial of service attacks). But do you know what it really is? It seems like DDOS is a very technical term, but this attack is easy to understand. Also, it is mostly used by cybercriminals all over the world, so it is important to understand what a DDOS attack is.


What is DDoS Attack

DDoS stands for Distributed Denial of Service. DDOS attack aims to disable the use of the system, application or machine, to block the service it wants. This attack can affect both sources offering information such as applications or transmission lines, as well as computer networks.

The web server can complete a number of requests or user connections simultaneously, if it exceeds that number, the server starts to slow down or may even fail to respond to requests or immediately block and disconnect from the internet.


DDOS Attack Type

 1. Denial of service (DoS).

 2. Distributed Denial of Service (DDoS).

The difference between the two is the number of computers or IPs carrying out the attack. DoS attacks generate a large number of requests from the same machine or IP address, thereby depleting the resources offered by the service until the time comes when it has no response capacity and starts rejecting requests, this is when a denial of service arises.

In the case of a DDoS attack, a request or connection is made using a large number of computers or IP addresses. These requests are all made at the same time and go to the same attack service object. DDoS attacks are more difficult to detect because the number of requests comes from different IPs, and administrators cannot block the IPs making the requests, as is the case in DoS attacks.

Computers that carry out DDoS attacks will infect by malware so that they become bots or zombies, which can be controlled remotely by cybercriminals. A set of bots, that is, computers infected by the same malware, forms a botnet or also known as a zombie network. These networks have a higher capacity to destroy servers than attacks by just one machine.

To check if your computer is infected with any type of malware and belongs to a zombie network, you can use a service like Malwarebytes which will detect if your system belongs to malware.


Why Was This Attack Carried Out?

As we have seen, denial of service attacks is used to disable the services offered by the server, cause the system to collapse and take advantage of its vulnerabilities. Cybercriminals aim to cause harm, both to the users who provide the services and to the administrators who offer them. This causes losses, both economic and user confidence.

By far, the most significant denial of service attack in history occurred on February 28, 2018, to the famous collaborative project platform. This attack is carried out in a distributed manner, namely with a DDoS attack. Despite all the security available to the platform, it couldn't cope with the bombardment of 126.9 million packets or about 1.35 terabits/sec. This attack is carried out through a botnet network using servers from various entities.


How to Avoid DDOS Attack

As users, we have to check router and firewall configurations to detect incorrect or incorrect IPs, which come from possible attackers. Usually, the Internet Service Provider (ISP) ensures that our router is secure with this configuration.

On the other hand, organizations and companies that provide these services must protect their networks and infrastructure to prevent DDOS attacks from affecting the performance of their work and, as a consequence, their clients. If a company is affected by a Distributed denial of service (DDoS attack), it will lose the trust of its customers. And do you guys know this type of attack? 

Hopefully, this article about What is a DDOS attack and how to avoid it, gives you a little insight. Also, read an article about What is a port in a computer network that you may need to know. Thank you.

Previous Post Next Post