Distributed Denial of Service: The Attack and Defense

Arunarka Mukhopadhyay
3 min readOct 8, 2023

--

DDoS, or Distributed Denial of Service, is an infamous form of cyber-attack that aims to disrupt a network or service, rendering it unusable to its intended users. These attacks, though prevalent since the advent of the World Wide Web, have gained prominence in recent years, with numerous attacks affecting major and smaller online platforms. In this blog, we will delve into the working of DDoS attacks and explore how businesses can defend themselves from such threats.

What is a DDoS Attack?

In a DDoS attack, the attacker exploits multiple compromised systems to target a single system, causing a denial of service (DoS). These attacks tend to flood the targeted system with an overwhelming amount of traffic, effectively overloading its resources and causing it to crash or become unresponsive. These requests are superfluous and the attacker has no acceptable reason to make these requests other than malevolent intentions.

Schematic diagram of DDoS attack(https://www.researchgate.net/figure/Schematic-diagram-of-a-DDoS-attack_fig1_365618619)

There are different types of DDoS attacks:

1. Volume-Based Attacks: The goal here is to douse the bandwidth of the targeted site. Examples include ICMP floods and UDP floods.
2. Protocol Attacks: These focus on exploiting server resources. Examples include SYN floods.
3. Application Layer Attacks: These target applications and are often the most subtle and potent. Examples include HTTP GET and POST attacks.

The Motive Behind DDoS

Various motives which drive the modern DDoS attacks:

- Retaliation: Often perpetrated by hacktivist groups to send a political message.
- Business Competition: Rivals might use DDoS as a dirty tactic to harm a competing business.
- Extortion: Attackers demand money in exchange for halting the attack.
- Distraction: DDoS can be used to divert attention from another malicious activity taking place.

The Defense Strategy

Protecting against DDoS attacks requires a multi-layered approach:

1. Upstream traffic filtering: All traffic destined to the victim is pivoted to pass through a cleaning center via various methods such as: changing the victim IP address in the DNS system, tunneling methods, proxies, digital cross connects, or even direct circuits, which disjoints bad traffic and only sends legitimate traffic to the victim server.

2. Content Delivery Networks (CDN): CDNs can mitigate DDoS attacks by distributing traffic across a vast network of servers.

3. Overprovisioning: Always keep more bandwidth than you need. This ensures that even during an attack, some portion of your legitimate traffic gets through.

4. DDoS Protection Services: These are specialized services that detect and mitigate large-scale DDoS attacks.

5. Redundancy: Have backup infrastructure in place. If one set of resources becomes overwhelmed, the traffic can be redirected to another.

6. Incident Response Plan: Always have a plan in place for when things go awry. This ensures a swift and coordinated response during an attack.

7. Educate and Train Your Team: A well-informed team can recognize early signs of an attack and act quickly to mitigate it.

Conclusion

The digital realm offers endless opportunities for growth and connectivity, but it also brings along a set of challenges. DDoS attacks, though formidable, can be managed and mitigated with a combination of technology, planning, and vigilance. As the cyber landscape evolves, it’s crucial for businesses to stay informed and proactive in their defensive measures.

Further Reading and References:
1. https://owasp.org/www-community/attacks/Denial_of_Service

2. https://en.wikipedia.org/wiki/Denial-of-service_attack

3. https://www.researchgate.net/figure/Schematic-diagram-of-a-DDoS-attack_fig1_365618619

--

--