With almost all businesses moving online, what would happen if it was unavailable even for a few hours in a day? Business would slump, leads would be lost, new business relationships cannot be forged, profits would fall and this may lead to other disasters within the organization as well. This is exactly what could happen if there was a DDoS attack on an organization that is solely dependent on its online model for its business.
For the security conscious, individuals and organization, ‘DoS’ attacks and ‘DDoS’ attacks are not new. In a ‘Denial of service’ attack or DoS attack the host is bombarded with multiple TCP/UDP packets from a single computer and a single Internet connection. The host is unable to handle the hundreds and thousands of fake requests and the site slows down or totally crashes.
DDoS or the ‘Distributed Denial of service attack’ on the other hand is closely related to the DoS attack but is much more, fierce. In a DDoS atack, instead of one attacker, a few attackers try to overwhelm and bring down a system by making use of multiple computers and multiple Internet connections around the world. A master computer gives directions to other slave computers and they in turn will cripple financial systems or ruin major corporations. It is much more difficult to recover from a DDoS attack as it is harder to locate the origin of the attack.
Some statistics related to DDoS attacks:-
Having seen the definitions and statistics related to DDoS, let us dive into the changes in the DDoS attacks.
Changes in DDoS attacks:
Technology changes and so do hackers and their strategies. With most businesses aware of DDoS attacks today, they are better prepared to handle the attacks. However, while large scale attacks are easier to detect and mediate, there have been more, smaller DDoS attacks on the scene. These smaller attacks do not trigger any defenses on the organization’s end. They are also shockingly stated to be detected only by 28% of businesses! According to Neustar Q2, 2019 Cyber Threats and trends report, smaller attacks can be carried against specific services, gateways, applications, and Application Programming Interfaces (API) (Q2, 2019 CYBER THREATS AND TRENDS REPORT)
These smaller attacks are used by hackers to proliferate, systems and install malware. They also cause the system to slow down thus degrading the process of the site.
How to handle the DDoS attacks:
Given the changes in DDoS strategies, it is good to find the valuable assets in an organization and place it under “always-on” DDoS mitigation strategy. Once done, the traffic has to be monitored to analyze it completely. This will lead to a conclusion as to whether the valuable assets have to be constantly under the “always-on” category or other resources also, have to be protected.
Enroll in our ‘CyberSec First Responder(CFR)’ training course today!!
DDoS attacks in Q2 2019. (2019, August 5).
Retrieved from securelist.com: https://securelist.com/ddos-report-q2-2019/91934/
Q2, 2019 CYBER THREATS AND TRENDS REPORT. (n.d.). Retrieved from Neustar.com: https://ns-cdn.neustar.biz/creative_services/biz/neustar/www/resources/whitepapers/it-security/neustar-q2-2019-cyber-threats-and-trends-report.pdf?_ga=2.174411234.1500557722.1565942871-685205413.1565805427