From CISO Marketplace — the hub for security professionals Visit

DDoS Attack

Threat Intelligence

Definition

Overwhelming target systems with excessive traffic to disrupt service availability.

Technical Details

A Distributed Denial of Service (DDoS) attack occurs when multiple compromised systems, often part of a botnet, are used to flood a target system with a massive volume of traffic, overwhelming its resources and rendering it unable to respond to legitimate requests. This can be executed through various methods such as SYN floods, UDP floods, and HTTP request floods. The attack can target various layers of the OSI model, primarily focusing on the Network layer (Layer 3) and the Application layer (Layer 7). Mitigation strategies may include rate limiting, traffic analysis, and deploying DDoS protection services.

Practical Usage

DDoS attacks are commonly used by malicious actors to disrupt services for businesses, government organizations, and critical infrastructure. Organizations may implement DDoS mitigation solutions to protect their online services. This includes setting up redundant network configurations, utilizing content delivery networks (CDNs) to absorb excess traffic, and employing specialized DDoS protection services that can identify and filter malicious traffic in real-time.

Examples

Related Terms

DoS Attack Botnet Mitigation Traffic Analysis Layer 7 Attack
← Back to Glossary