Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) attacks is critical attacks that compromise the availability of the resources of the service network. The main aim of attackers using DDoS techniques is to stop legitimate users from assessing the victim’s services and resources. In the DDoS attack, Attackers generate malicious packets as traffic into the victim’s network, which degrades the targeted servers and networks. This effect will make the victim’s network, server, and applications unreachable and can’t operate and communicate as they should be.

Recently, the trend of DDoS attacks is high in overall network attacks. The DDoS attacks generally send various requests to the targeted network to reduce the capacity of the website, network, and server to handle multiple requests, which definitely prevents the website or network to run genuinely. Once the attackers get access to legitimate devices by bleaching their network and application vulnerabilities, it results in different types of restrictions like limited resources, weak security, congestion, etc., and spreading for other viruses.

It is reported in 2017, that 86 percent of the total attacks are reported which are aggregated of different variations possible in simulating a DDoS attack and are complex for identification and mitigation. Now a day, Gaming server and their network are being victims of DDoS attacks continuously and It is found that gaming traffic is responsible for up to 30 percent of DDoS attacks. Data recorded in 2018, Different critical institutions which provide commercial services, Cloud services, healthcare, education, telecommunication industry, and power plants are known to be the first priority of the attacker where the attacker can make those organizations’ services and networks unreachable for many hours for the genuine users. Currently, Used DDoS attack techniques are discussed as below:

  • Acknowledge(ACK) and Synchronize(SYN) flood:
  • Domain name server (DNS) amplification
  • Network Time Protocol Amplification (NTP) :
  • User Data Protocol(UDP) flood and fragment attack
  • HTTP flood:
  • Internet Control Message Protocol flood (ICMP):
  • Zero-day DDoS :

Some examples of malware or botnets that are used recently for DDOS attacks:

  • Mirai
  • Wirex
  • Reaper
  • Torii:
  • 3ve-2018
  • Stuxnet

One thought on “Distributed Denial of Service (DDoS)”

Leave a Reply

Your email address will not be published. Required fields are marked *