Home Blog Beware The DDoS (Distributed Denial of Service) Attack!

Beware The DDoS (Distributed Denial of Service) Attack!

 2019/02/25   IT & Cyber-Security Solutions   2554 visit(s)

Ctelecoms_Character    
 By:Ctelecoms

 Ctelecoms

Beware_The_DDoS__Distributed_Denial_of_Service__Attack_-_how_to_protect_yourself

What is DDoS Attack?

According to Cisco, a distributed-denial-of-service, or DDoS, attack is the bombardment of simultaneous data requests to a central server. The attacker generates these requests from multiple compromised systems.

DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.

In doing so, the attacker hopes to exhaust the target’s Internet bandwidth and RAM. The ultimate goal is to crash the target’s system and disrupt its business.

What does a DDoS attack look like?

When launching a DDoS attack the attackers aim at making a service or a server unavailable. In order to do so they infect one or various computers with malware. The attackers use this infected computer network, known as botnet, to launch their DDoS attack. Using the botnet, they attack their target by sending a large amount of requests to the infrastructure.

The more computers are in one botnet, the stronger is the attack. Attacked servers without DDoS protection cannot handle so many requests, their Internet connection breaks down. Websites either load extremely slowly or are not available at all.

How does a DDoS attack work?

A DDoS attack requires an attacker to gain control of a network of online machines in order to carry out an attack. Computers and other machines (such as IoT devices) are infected with malware, turning each one into a bot (or zombie). The attacker then has remote control over the group of bots, which is called a botnet.

Once a botnet has been established, the attacker is able to direct the machines by sending updated instructions to each bot via a method of remote control. When the IP address of a victim is targeted by the botnet, each bot will respond by sending requests to the target, potentially causing the targeted server or network to overflow capacity, resulting in a denial-of-service to normal traffic. Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.

The Most Common Types of DDoS Attack

Volume-based attacks

UDP flood: User Datagram Protocol (UDP) floods attack random ports on a remote server with requests called UDP packets. The host checks the ports for the appropriate applications. When no application can be found, the system responds to every request with a “destination unreachable” packet. The resulting traffic can overwhelm the service.

ICMP (ping) flood: An Internet Control Message Protocol (ICMP) flood sends ICMP echo request packets (pings) to a host. Pings are common requests used to measure the connectivity of two servers. When a ping is sent, the server quickly responds. In a ping flood, however, an attacker uses an extensive series of pings to exhaust the incoming and outgoing bandwidth of the targeted server.

Application attacks

HTTP flood: An HTTP flood is a Layer 7 application attack that uses botnets, often referred to as a “zombie army.” In this type of attack, standard GET and POST requests flood a web server or application. The server is inundated with requests and may shut down. These attacks can be particularly difficult to detect because they appear as perfectly valid traffic.

Slowloris: Named after the Asian primate, the Slowloris moves slowly. The attack sends small portions of an HTTP request to a server. These portions are sent in timed intervals, so the request does not time out, and the server waits for it to be completed. These unfinished requests exhaust bandwidth and affect the server’s ability to handle legitimate requests.

Protocol attacks

SYN flood: In a SYN flood attack, the attacker sends seemingly normal SYN requests to a server, which responds with a SYN-ACK (synchronized-acknowledgment) request. Typically, a client then sends back an ACK request, and a connection is made. In a SYN flood attack, the attacker does not respond with a final ACK. The server is left with a large number of unfinished SYN-ACK requests that burden the system.

Ping of Death: In a Ping of Death attack, the attacker tries to crash or freeze a server by sending a normal ping request that is either fragmented or oversized. The standard size of an IPv4 header is 65,535 bytes. When a larger ping is sent, the targeted server will fragment the file. Later, when the server formulates a response, the reassembly of this larger file can cause a buffer overload and crash.

Which industry is mostly affected by DDoS attacks?

Every industry and every company can become a victim of a DDoS attack. Thus it is not a question of if it will happen to your company, but rather when it will happen. Cyber criminals and extortionists target e-commerce, insurances and financial institutions, manufacturers, or the health sector. They also like to attack data centers and organizations from the public sector.

What are the consequences of a DDoS attack?

An attack always has a negative impact on the affected company, regardless of the technique. The companies can feel the repercussions for years after the attack. Therefore, an effective DDoS protection is key.

Economic damages

A few minutes offline can cost thousands of euros. Lost sales and wasted marketing budgets only form one part of the financial damages.

Damaged image

A DDoS attack entails an incalculable damage to one’s reputation. To restore the image costs many resources and can take to years.

Unhappy users

When the target audience cannot reach your website, the impatient user might leave and buy at the competitor’s website.

Data theft

Possible theft of company or client data can have unpredictable repercussion. It can mean the end for some companies.

Protect Your Business Against DDoS Attacks with Cisco Next-Gen Firewalls

As a premier Cisco partner in Saudi Arabia, Ctelecoms can help you guard against all types of cyber security threats, including DDoS attacks. We provide a wide range of Cisco security solutions for businesses of all sizes across KSA. Talk to Ctelecoms team today and let us get your business protected.






Search the Blog

Subscribe Blog

Solutions

security-icon

IT & Cyber-Security Solutions

Best-in-class cyber security solutions to ...

microsoft-icon

Microsoft Cloud Solutions

Explore Ctelecoms extensive selection of ...

capling-icon

Datacenter Solutions

Solve issues, streamline operations, promote ...

backup-icon

Cloud Backup & Disaster Recovery Solutions

Keep your data, apps, emails and operations ...

capling-icon

Computing & Hyper-converged Infrastructure Solutions

Take your IT infrastructure to the next level ...

networking-icon

Unified Communications & Networking Solutions

Ensure you are securely connected with all ...

meraki-icon

Meraki Networking Solutions

Quickly deploy a reliable, secure, cloud-managed ...