DDoS
Also called: distributed denial of service or denial of service(DoS)
A distributed denial of service (DDoS) is an attack on a computer, server or network with the aim of reducing accessibility or even completely shutting down systems. In both a distributed denial of service and a denial of service (DoS), this is done by sending large amounts of data packets.
When network connections and systems are given more to process than they can handle they become overloaded. As a result, they may go down or at least will work considerably slower.
The addition distributed means that the attack is carried out not using one but from multiple systems. It can be a coordinated attack carried out by several people simultaneously. More often, DDoS attacks are carried out using networks built from infiltrated third-party systems. Such networks, also known as botnets, can consist of thousands of computers scattered around the world that can remotely execute instructions. Malware, viruses and other software vulnerabilities can be used to build botnets.
Why and by whom DoS attacks are carried out can vary widely. Many attacks are carried out by groups or individuals, with or without specific intentions. Conducting an attack is inexpensive: it mainly requires the right software. A DDoS attack can already be carried out by a high school student in an attic room. Attacks can also come from organizations or governments. The motivation behind an attack can range from economic (such as taking websites, financial systems or demanding a ransom), politically motivated or even sabotage without a direct interest.
Most known attacks are designed to take Web sites offline. Basically, any Web site can fall victim to a DDoS. Often financial institutions such as banks are targeted, for example to shut down payment traffic. Government agencies such as the tax authorities are also regularly under attack.
Technically, a DDoS attack can be carried out in several ways. Fortunately, there are also ways to avert the attacks before they can cause inconvenience or damage. One strategy may simply be to buy more bandwidth and computing power. More effective is to recognize attacks as soon as they present themselves and actively respond to them by blocking or redirecting traffic. Many firewalls, routers and switches are equipped with smart software that can detect and block attacks.