12 Days of Cyber- What Are DDOS Attacks and How to Defend Against Them


18 Dec 2015

12 Days of Cyber- What Are DDOS Attacks and How to...

Distributed Denial of Service (DDoS) attacks are one of the most effective and disruptive weapons in a hacker’s arsenal and are used to try and make a website or online service unavailable by flooding a server with traffic.

DDoS attacks are often used by hacktivist groups and tend to target the websites of financial institutions, businesses and news outlets. The attacks can present a major challenge and can cause disruption to customers. Fortunately DDoS attacks rarely last longer than 8-12 hours as it is difficult to maintain a high volume of traffic for an extended period of time.

How Does A DDoS Attack Work?

Hackers build up networks of computers infected by malicious software, which is often spread via emails and websites. Once a machine is infected it becomes part of a ‘botnet’ and can then be controlled remotely without their owner’s knowledge. The botnet is then used to launch an attack against a target. The largest DDoS attacks can see a hacker using botnets that are millions of machines in strength. The attack can be created several ways such as flooding a server with traffic, sending more connections requests than it can handle or by sending the target huge amounts of random data that use up its bandwidth. On the Dark web it is relatively easy to buy or sell botnets to use in DDoS attacks.

How to Defend Against DDoS Attacks

DDoS attacks can be protected against using a variety of common techniques. A firewall can be configured to deny more than x number of requests. There are also load balancing solutions such as CloudFlare which protect against DDoS attacks.

When a business or organisation falls under attack speed is of the essence. PGI Cyber’s monitoring services keeps an eye on a client’s systems for signs of malicious activity and warns if they are under attack. Outsourcing Protective Monitoring to PGI results in world-leading experts watching out for abnormalities, highlighting risks and providing mitigation solutions, as well as recovery recommendations.

For the latest PGI updates like our pages on LinkedIn – PGIPGI Cyber and Facebook – PGIPGI Cyber

 

 

Share this article

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Weekly Cyber Bytes email where you'll be receiving updates, tips and narrative around what has been happening in the world of information security.

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP