DDoS

DDoS protection

DDoS protection, prevention and mitigation have never been more critical.

Placeholder for XaaS Anything as a ServiceXaaS Anything as a Service
Introduction

What is DDoS?

Any organisation that uses the Internet to conduct its core business runs the risk of loss of business, revenue and reputation if its systems are no longer available. DDoS attacks pose an ever-increasing threat to businesses that are reliant on the Internet for service availability. Some types of online businesses are more likely to suffer from such attacks than others. However, all will recognise that there is a risk that their business and its revenue will be compromised without some sort of DDoS protection service.

‘Distributed Denial of Service’, aka DDoS attacks, attempts to make a computer or network device unavailable or at least disrupt its function or service. They are categorised as ‘distributed’ because the attacks aren’t generated by a single attack host, but distributed over several hosts, usually a so-called botnet.

Types of attacks

What to look out for

There are three main categories of attacks

State attack

A state attack bombards the target with massive numbers of connection attempts and may try to keep them active. The target host and infrastructure cannot cope with such a large number of sessions, limits are reached, and it simply stops responding to requests, rendering it useless.

Volumetric attack

A volumetric attack sends extreme volumes of traffic in an attempt to completely saturate the target’s connections, effectively muscling out further legitimate traffic.

Sometimes other, often legitimate servers on the Internet are co-used for these types of attacks. This is becoming an increasingly popular method of attack. In such cases, special requests are sent to the target servers. It then uses specific functions to have the legitimate host send massive amounts of traffic back in response to what it believes is the requesting source, but it is in fact the attack destination. These are known as amplification or reflection attacks.

Application attacks

Application attacks identify weaknesses in applications and are used to either retrieve sensitive information, crash applications or abuse them for nefarious purposes such as gaining full access to the host on which the application resides or other hosts within the set-up.

Implications of DDoS attacks

The consequences

DDoS attacks are unfortunately a fact of life, with the frequency, size and sophistication of attacks increasing each year. It is not unusual to see packet requests of between 2.4m and 7.5m per second. DDoS attacks can have serious implications for both service providers and enterprises.

From the victim’s perspective a DDoS attack can render their Internet connection or targeted host(s) useless within seconds, effectively disconnecting them from their customers, prospects and partners.

An online company’s business is all about being able to reliably and consistently deliver an increasing array and volume of content types to its users without any degradation to service quality.

Solutions

Solving the problem

Every customer has specific needs and requirements. This can be on a functional level, and the type of solution required is often specific to the type of organisation. Some deviations seen in practice:

CDNs

Content Delivery Networks (CDNs) tend to have a detailed view of their traffic and manual programming of the anti-DDoS solution is accepted practice. Protection against volumetric and state attacks is of high importance and in-line solutions are usually preferred, often with cloud services.

Enterprise Networks

Enterprise networks, depending on their size, tend to vary between either more comprehensive data centre protection or are focused on the full mix of data centre and office. Usually, in-line solutions are preferred although some cases provide more efficiency when they are redirect based. Cloud services are relatively popular amongst larger organisations.

Service Provider Networks

Service provider (SP) networks usually require holistic solutions and are redirect based due to high or very high capacity. When hosting critical services within their own data centres or delivering connectivity for customer data centres, some SPs like to expand this with an additional layer of inline solutions in front of these deployments. Also, in some cases DDoS protection is offered as a paid or managed service.

Our ecosystem

Leading DDoS technology partners

Connect with us

Get in touch with our security experts

Our team is available for a quick call or video meeting. Let's connect and discuss your security challenges, dive into vendor comparison reports, or talk about your upcoming IT-projects. We are here to help.

Placeholder for Portrait of engineer beard wearing poloPortrait of engineer beard wearing polo
Updates

Latest news and blog posts