According to Google, a Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
Building Capacity
Attackers build networks of infected computers, known as ‘botnets’, by spreading malicious software through emails, websites and social media. Once infected, these machines can be controlled remotely, without their owners’ knowledge, and used like an army to launch an attack against any target. Some botnets are millions of machines strong.
Launching Attacks
Botnets can generate huge floods of traffic to overwhelm a target. These floods can be generated in multiple ways, such as sending more connection requests than a server can handle, or having computers send the victim huge amounts of random data to use up the target’s bandwidth. Some attacks are so big they can max out a country’s international cable capacity.
Selling Silence
Specialized online marketplaces exist to buy and sell botnets or individual DDoS attacks. Using these underground markets, anyone can pay a nominal fee to silence websites they disagree with or disrupt an organization’s online operations. A week-long DDoS attack, capable of taking a small organization offline can cost as little as $150.
Impacts of DDoS Attacks on Your Business
Revenue Loss
Downtime affects your bottom line. Based on industry surveys, the average cost of downtime is $5,600/minute, or over $300K/hour.
Productivity Loss
When critical network systems are shut down, your workforce’s productivity comes to a halt.
Reputation Damage
Your brand suffers if customers can’t access your site or become casualties of a data breach.
Theft
Attacks are becoming more advanced and now include stolen funds, customer data, and intellectual property.
3 Stats about DDoS Attacks:
- Attack sizes grew 34% from Q1 2015 to Q2 2015
- 62% of attacks peaked at more than one Gbps
- 1/3 of all mitigations were for the IT/Cloud/SAAS industry
Source: Google
阅读更多
Defending Against Ransomware
Ransomware attacks are far too common in today’s
Differences Between Fault Tolerant And High Availability
Have you ever wondered how major websites like Google o
11 月
How To Choose Between On Premise And Cloud Infrastructure
Are you struggling to decide between on premise and clo
10 月
What Is Open Source & Closed Source?
Imagine a world where the blueprints for every inventio
10 月
How Does Load Balancing Work?
Imagine you are trying to access a popular website, but
9 月
How AI is Affecting Cloud Computing
In recent years, the rapid advancement of artificial in
9 月