What Is a Distributed Denial of Service (DDoS) Attack?

A distributed denial of service (DDoS) attack sends a massive flood of traffic to a website, server or network so that it stops working entirely or performs so poorly that it disrupts service.

CDW can improve your organization's security with advanced threat detection and response capabilities.

The Purpose of a DDoS Attack

DDoS attacks are incredibly disruptive, and sometimes disruption is the attackers’ primary goal. They may have a political or ideological motivation to attack a target or simply want to wreak havoc. In other cases, attackers try to leverage the attack for financial gain. For example, they could refuse to stop an attack until the target pays a ransom. They could also launch a DDoS attack as cover for other types of attack that allow them to infiltrate the target’s network and steal valuable data.

How Does a DDoS Attack Work?

Before launching an attack, a cybercriminal must first select a target. That choice will depend on factors such as the criminal’s intent and the effectiveness of the target’s defenses. Then, the attacker assembles the resources they will need, such as a botnet, to generate massive traffic.

DoS vs. DDoS

A denial of service (DoS) attack is smaller in scope than a DDoS attack, using only one internet connection to overwhelm a target. A DDoS attack, by contrast, could deploy hundreds, thousands or millions of devices against a target. The massive volume of devices and internet connections that exist today makes DDoS attacks harder to defend against.

Botnets

Attackers lay the groundwork for a DDoS attack by infecting multiple internet-connected devices with malware that lets them control those devices remotely. A group of infected devices (bots) is called a botnet. Once attackers have a botnet under their control, they can deploy it against the target.

Launching an Attack

Attackers instruct each bot to send a connection request to the target website in a simultaneous event designed to overwhelm the website (or its underlying servers or network). Because each bot appears to be a legitimate device, the target’s cybersecurity defenses may not recognize that they are compromised and will grant them access — ultimately leading to a shutdown or a significant slowdown.

Signs of a DDoS Attack

Some signs of a DDoS attack are obvious: A website suddenly goes offline or network performance plummets for no apparent reason (such issues may also stem from other causes).

Additional signs that may indicate a DDoS attack include:

  • Unusual traffic patterns, such as sudden spikes from a single region or a flood of traffic from one IP address
  • Increased Domain Name System (DNS) request failures, indicating a breakdown in the internet system that connects users to websites
  • Prolonged bot activity detected by behavioral analysis tools

Cost and Impact of DDoS Attacks

DDoS attacks are nefarious because they can hurt targets in several ways. Many organizations depend on internet connectivity to operate, and any prolonged disruption can be detrimental. For example, an online retailer shut down by a DDoS attack would temporarily be unable to sell products.

DDoS is also disruptive because the victim must focus time, money and other resources to resolve the attack instead of focusing on its core business. When an attack harms a victim’s customers, partners or other stakeholders, it can cause lasting reputational damage.

Cybercriminals may also use a DDoS attack to cover a data breach or learn more about a target’s cybersecurity defenses. And, in the case of ransomware, a victim may end up paying a ransom to stop the attack.

Real-World DDoS Attack Examples

Dyn

In 2016, cybercriminals launched repeated DDoS attacks against Dyn, one of the companies that handles DNS services on the internet. As a result, numerous other major sites, including Netflix and Reddit, experienced outages for several hours because they could not complete DNS processes.

One factor that made this attack unique was that it involved the Mirai botnet, which comprises connected devices (such as digital cameras and smart TVs) rather than computers. Analysts said that allowed for a large-scale attack because so many devices are connected, and often they are not as well protected as computers.

GitHub

In 2018, cybercriminals struck at GitHub, an online platform that developers use to create and manage software code. This DDoS attack used amplification, originating from more than 1,000 autonomous systems, that involved tens of thousands of endpoints. At the attack’s peak, GitHub’s network was hit with 1.35 terabits of data per second, far more than previous DDoS attacks. GitHub detected the attack promptly and was able to recover quickly with help from its DDoS mitigation partner.

Undisclosed Amazon Web Services Customer

Amazon Web Services (AWS) is one of the world’s largest cloud service providers. One of its customers suffered a massive DDoS attack in 2020. Because the customer was operating on AWS infrastructure, AWS stepped in to defend against the attack. It deployed AWS Shield, the security service it uses to protect customers from DDoS and other attacks. With a peak volume of 2.3 terabits per second, the traffic in this attack set a new record.

Types of DDoS Attacks

When a user connects to a website, several processes are happening behind the scenes to make that connection happen. One model of internet connectivity has seven layers, each responsible for a different step in the process. Different types of DDoS attacks target different layers. In addition, DDoS attacks often target protocols, or the rules that govern how traffic moves around the internet.

Volumetric Attacks

Volumetric attacks, the most common type of DDoS attack, overwhelm the target with malicious traffic that blocks legitimate traffic. This influx ties up all of the target’s network bandwidth so the site can no longer work properly. Attackers amplify the traffic by using a botnet or sending small connection requests to the victim’s servers in such a way that they generate immense traffic.

UDP Floods

This type of volumetric DDoS attack involves the User Datagram Protocol (UDP), one of the ways computers exchange data quickly. An attacker can overload a target’s server by sending a massive amount of UDP packets at once.

ICMP Floods

The Internet Control Message Protocol (ICMP) lets computers send quick, brief messages to each other — more like a “ping” than actual data. In an ICMP flood attack, the target receives so many pings that its network is overwhelmed.

Resource or Application Layer Attacks

While a volumetric attack overwhelms the victim’s network bandwidth, a resource or application layer attack directly targets the victim’s website or application. For example, by sending many fake requests to a site, attackers can overwhelm its underlying infrastructure — the CPU, memory or databases — and cause the site to crash.

Protocol Attacks

A protocol attack exploits the rules that help computers and networks exchange data efficiently. For example, one type of protocol translates website URLs into IP addresses. Attackers take advantage of weaknesses in these protocols to overload the network infrastructure.

SYN Flood

A synchronized (SYN) flood disrupts the process that two computers use to initiate an exchange. Usually, a three-step process enables the devices to connect. But in a SYN flood attack, the bad actor starts the process repeatedly without completing it — once again, tying up the target’s systems.

Smurf Attack

In a Smurf attack, an attacker sends a fake message — made to look like it is coming from the victim’s IP address — to many other computers. When all of those computers reply to the victim, they overwhelm the target’s system. Smurf attacks are named for the small, blue cartoon characters who take on a much bigger targets by working together.

DNS Amplification/Reflection Attacks

DNS servers are analogous to phone books or directory assistance for the internet. When a user types in a website address, the DNS server looks up the IP address for that site to make the connection. A DNS amplification/reflection attack works by sending DNS lookup requests — spoofed so they appear to be from the victim — thereby tricking DNS servers into sending multiple responses to the victim.

Multivector DDoS Attacks

Attackers may deploy more than one type of DDoS attack at once or over a period of time.

Future of DDoS Attacks

Cybercriminals use emerging technologies to refine their tactics, so organizations must continually adapt their defenses. Here are three ways that technology advances have changed DDoS attacks:

  • Artificial intelligence–enhanced DDoS attacks: Artificial intelligence (AI) creates several advantages for cybercriminals. It can generate bots that are harder to distinguish from legitimate users, so security solutions may fail to weed out malicious traffic. AI can be adaptive, changing tactics during an attack in response to a target’s defenses. AI also helps attackers scan security systems for vulnerabilities, making attacks more efficient and more effective.
  • Ransom DDoS (RDDoS): Combining the disruption of a DDoS attack with a demand for payment, RDDoS is a growing concern. Cybercriminals know that organizations need online connectivity to carry out their work and thus may be willing to pay to end the attack.
  • 5G networks and Internet of Things devices: The number of connected devices has increased exponentially and will continue to grow. That creates more opportunities for cybercriminals to compromise devices and enlist them in an attack, creating a botnet that is harder to stop.

How to Prevent and Mitigate a DDoS Attack

Organizations use various solutions and strategies to prevent DDoS attacks and mitigate the damage they can cause. The right defense will help organizations identify and filter out malicious traffic while protecting systems from further damage and maintaining operations as much as possible. Often, a cybersecurity platform will include features and capabilities meant to counter DDoS attacks, among other types of threats.

Here are some of the most common defenses against DDoS attacks.

Traffic Differentiation

Differentiation analyzes network traffic to stop malicious traffic while allowing legitimate traffic through. The analysis looks at traffic patterns, such as volume or sources, and filters it according to predetermined rules.

Web Application Firewall

Web application firewalls filter traffic at the application layer to prevent known attack patterns, such as bots or suspicious requests, from reaching a website or application.

Load Balancers

Load balancing divides network traffic among several servers so that if an attack occurs, it will be less likely to overwhelm a single server.

Anycast Network Diffusion

Anycast network diffusion spreads traffic across multiple servers in different geographic locations to prevent an attack from overwhelming a single server.

Rate Limiting

Rate limiting lets an organization control the number of incoming connection requests that a user or an IP address can send in a period of time. This prevents attackers from overwhelming systems.

Blackhole Routing

After a victim’s system or network detects a DDoS attack, it can activate blackhole routing. This drops all traffic to the IP, whether malicious or legitimate, to contain the attack and prevent any further slowdowns or crashes.

Automated DDoS Mitigation Tools

Cloud-based DDoS mitigation solutions like those from from AWS Shield, Cloudflare, Akamai and others use AI to block attacks automatically based on preset rules. The combination of AI and automation enables targets to respond much more quickly than they could by relying solely on human monitoring.

Real-Time Attack Monitoring

The ability to monitor network traffic in real time and to quickly identify threats is essential. and threat intelligence platforms are crucial because they increase organizations’ visibility and control over their technology environments.

DDoS Protection Service

Organizations may engage an expert third party that specializes in DDoS protection. Typically, this is full-service protection involving security software that automatically detects and filters DDoS attacks in real time; server and network infrastructure designed to withstand DDoS attacks; and experts who are available to help if an attack occurs. Such services are helpful for stopping attacks and minimizing attack damage or downtime.

Risk Assessment Services

Often, organizations find it valuable to engage  cybersecurity experts who can assess risks in their environment and evaluate their organization’s cybersecurity capabilities against best practices. For example, CDW provides penetration testing to help your organization identify security gaps and vulnerabilities before attackers do. By strengthening your cyber resilience, your organization will be much more likely to withstand and quickly recover from an attack.

When to Involve Law Enforcement or Cybersecurity Firms

When a significant DDoS attack occurs, an organization’s first call may be to a cybersecurity firm, such as a DDoS protection service provider. These partners can help victims contain the attack and minimize the impact so they can restore normal operations as quickly as possible. Forensic investigators can help victims determine the cause of the attack, both to prevent a recurrence and to support any future criminal prosecution.

It’s not unusual for organizations to lack the internal expertise to perform these operations themselves. Victims may also report the attack to law enforcement agencies, which can support investigations, gather evidence and potentially pursue the attackers.

How CDW Can Help With DDoS Protection

Expert partners like CDW provide tactical, operational and strategic insights to help organizations understand where they are most vulnerable, and work with them to establish appropriate countermeasures. With deep expertise in cybersecurity, CDW takes a holistic approach to threat and vulnerability management, helping organizations mature their security posture across networks, cloud environments and endpoints.

Learn how CDW can improve advanced threat detection and response capabilities.

DDoS FAQs

arrow How Long Does a DDoS Attack Last?

Most DDoS attacks last less than 24 hours, and some last only a few minutes. However, if the attacker is determined to launch a large-scale attack or compel the target to pay a ransom to end the attack, it could continue for days or even weeks.

arrow Can a DDoS Attack Enable Data Theft?

A DDoS attack doesn’t steal data directly, but it can create opportunities for cybercriminals to do so. One tactic is to use DDoS as a distraction. While the organization and its IT and cybersecurity teams respond to the DDoS attack, the hackers may be infiltrating the network elsewhere.

Criminals may also use a DDoS attack to find vulnerabilities in an organization’s cybersecurity defenses. For instance, when attackers overwhelm a system, it gives them an opportunity to learn which security tools slow down or fail. They may be able to identify security misconfigurations that create vulnerabilities. They can use this information later to launch an attack in which they steal data.

arrow Can a Virtual Private Network Stop a DDoS Attack?

A virtual private network provides a secure internet connection. It can help defend against a DDoS attack because it typically has stronger protections than a typical user device, so it can absorb more traffic. In addition, a VPN masks the user’s IP address and uses its own IP address instead, which means that the VPN — not the user — will be targeted by any attack.

arrow What Is DDoS as a Service?

Individuals who want to launch a DDoS attack against a target but lack the necessary technical skills can hire cybercriminals to do it for them through DDoS as a Service. The dark web has made this process relatively easy, with customers using DDoS as a Service platforms to input the website or IP address they want to target, choosing the type of attack and paying the fee, often in cryptocurrency.

CDW can improve your organization's security with advanced threat detection and response capabilities.