{"id":2221,"date":"2014-05-16T10:24:37","date_gmt":"2014-05-16T15:24:37","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2221"},"modified":"2015-04-24T16:22:30","modified_gmt":"2015-04-24T21:22:30","slug":"understanding-a-ddos-attack","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/understanding-a-ddos-attack\/","title":{"rendered":"Understanding a DDoS Attack"},"content":{"rendered":"<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2226\" title=\"Understanding a DDoS Attack\" src=\"\/blog\/wp-content\/uploads\/2014\/05\/chalk-board-ddos-attack.jpg\" alt=\"Understanding a DDoS Attack\" width=\"384\" height=\"269\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/05\/chalk-board-ddos-attack.jpg 500w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/05\/chalk-board-ddos-attack-300x210.jpg 300w\" sizes=\"auto, (max-width: 384px) 100vw, 384px\"><a href=\"http:\/\/blog.neustar.biz\/professional-services-2\/uk-ddos-attacks-bigger-and-badder-than-ever\/\" target=\"_blank\" rel=\"nofollow\">New research<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> released this month has shown that DDoS attacks are on the rise in the UK and USA. DDoS attacks, otherwise known as <a href=\"\/blog\/ddos-protection-the-case-for-businesses\/?ref=blog\" target=\"_blank\">Distributed Denial of Service attacks<\/a>,<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">are when someone or something tries to make an online service unavailable by bombarding it with huge streams of traffic from different sources. They can<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">target all kinds of web-based services, including banks, new websites and popular social networks. They are often used to prevent people or websites from <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">publishing\/providing access to information.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">A <a href=\"https:\/\/www.verisigninc.com\/en_US\/forms\/wpddosattentionreport.xhtml\" target=\"_blank\" rel=\"nofollow\">third of all website downtime<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> incidents are estimated to be the result <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">of DDoS Attacks<\/span><\/p>\n<h2><span style=\"font-size: 14pt; font-family: tahoma,arial,helvetica,sans-serif; color: #333399;\"><strong>How Does a DDoS Attack Work?<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"><a href=\"https:\/\/www.youtube.com\/watch?v=NogCN78XN2w\" rel=\"nofollow\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=NogCN78XN2w<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">People wishing to implement a DDoS attack on a website or service have a couple of options. They can either <a href=\"http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-russian-underground-101.pdf\" target=\"_blank\" rel=\"nofollow\">buy a DDoS attack<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> for as <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">little as $30, or, if they\u2019re more technically savvy, they can put one together themselves.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">A DDoS attack requires a lot of computing power. Most attackers don\u2019t have those computers to hand, so instead they build \u2018botnets\u2019. These are networks of<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">computers that have been infected with malware which takes control and barrages the target with requests. DDoS attacks are particularly damaging to small <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">websites, such as those used by SMEs and independents. They often don\u2019t have the necessary infrastructure to handle the attack of even a small botnet.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">There are a variety of ways that botnets can attack a site. They can send multiple connection requests per second, bombarding a site with enough data to <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">exhaust its data allowance, or attempting huge amounts of login requests to overload a site\u2019s capabilities.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">There\u2019s a fantastic resource from <a href=\"http:\/\/www.digitalattackmap.com\/#anim=1&amp;color=0&amp;country=ALL&amp;time=16195&amp;view=map\" target=\"_blank\">Digital Attack Map<\/a> that shows a live feed of<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">all the DDoS attacks happening across the globe currently, as well as all the DDoS attacks that have happened in the last year. As you can see, there\u2019s no<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">shortage of them all year round. The huge spikes of DDoS attacks like those seen in Aug 2013 are the kinds of attacks that can bring down government sites, <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">or exhaust smaller countries entire bandwidth allowance.<\/span><\/p>\n<h2><span style=\"font-size: 14pt; font-family: tahoma,arial,helvetica,sans-serif; color: #333399;\"><strong>Types of DDoS Attack<\/strong><\/span><\/h2>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline; font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif; color: #3366ff;\">TCP Connection Attacks<\/span><br>\n<span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> \u2013 These occupy an infrastructure\u2019s available connections so that others can\u2019t use them. It\u2019s a fairly precise strike, and can take down targets capable of<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">handling millions of connections.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline; font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif; color: #3366ff;\">Volumetric Attacks<\/span><br>\n<span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> \u2013 The crudest form of DDoS. A volumetric attack attempts to consume all of a service\u2019s bandwidth with a huge number of requests. These don\u2019t do any<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">long-lasting damage to a site, and are more about causing congestion and making it impossible to use.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline; font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif; color: #3366ff;\">Fragmentation Attacks<\/span><br>\n<span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> \u00ad  \u2013 A flood of fragmented data is sent to the target site, which then has to struggle to reassemble the data and make sense of it; this can severely reduce<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">the performance of a site.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline; font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif; color: #3366ff;\">Application Attacks<\/span><br>\n<span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> \u2013 The equivalent of a stealth-attack in DDoS terms. Application attacks can be conducted with a relatively small botnet. They generate a low rate of<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">traffic, but target and overwhelm a specific aspect of a site or application, such as a login or payment portal.<\/span><\/p>\n<h2><span style=\"font-size: 14pt; font-family: tahoma,arial,helvetica,sans-serif; color: #333399;\"><strong>DDoS objectives<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">People can instigate DDoS attacks for a number of reasons. They could be seeking to extort a business, beginning a DDoS attack when it is important that a <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">website be fully functional and then demanding money for the cessation of the attack.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">Espionage is another regular reason for DDoS attacks, because of their volume and visibility they have been used as a smokescreen for other less obvious<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">attacks which then sneak by the distracted incident response team. There are also plenty of instances of DDoS being employed purely as nuisance. Hackers<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">and other malicious presences online launch DDoS attacks just because they can. These attacks are often short lived though, and more an annoyance than a <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">serious issue for businesses.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">Some DDoS attacks may also be launched as a protest, either for or against a certain cause or issue. In these instances a central authority provides<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">\u2018hacktivists\u2019 with a target and details on how to implement a DDoS strike. These kind of \u2018opt-in\u2019 DDoS attacks are becoming more popular with protestors, <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">and are capable of bringing down large websites run by governments and other organizations that are perceived as being in the wrong.<\/span><\/p>\n<h2><span style=\"font-size: 14pt; font-family: tahoma,arial,helvetica,sans-serif; color: #333399;\"><strong>How Do I Protect Myself From DDoS?<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2233\" title=\"Fear and DDoS Attacks\" src=\"\/blog\/wp-content\/uploads\/2014\/05\/fear-and-ddos-attacks.jpg\" alt=\"Fear and DDoS Attacks\" width=\"165\" height=\"181\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/05\/fear-and-ddos-attacks.jpg 456w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/05\/fear-and-ddos-attacks-273x300.jpg 273w\" sizes=\"auto, (max-width: 165px) 100vw, 165px\">There aren\u2019t any sure-fire ways to protect yourself from a DDoS attack. But there are steps that you can take to make it much harder for your computer to<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">be harnessed as part of a botnet. Make sure to install and maintain a good antivirus software, as well as installing a firewall and <a title=\"PA Server Monitor\" href=\"\/servermonitor\/?ref=blog\">monitoring software<\/a><\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">that is configured to restrict the amount of traffic coming into and leaving your computer network or server. Furthermore, it pays to be cautious about <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">where you go on the internet and not to open any suspicious files that you find either on a website or in emails.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">The first thing is to make sure that you know the signs of a DDoS attack so you can best inform your clients and customers about exactly what is going on.<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">Signs of a DDoS attack include: an unusually slow network performance, inability to access websites, a big increase in the number of spam emails and <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">queries being submitted to your servers, and your own website going down. If all of these are true, then you are likely experiencing a DDoS attack.<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">After you\u2019ve determined that your business is the target of an assault, your administrators should make it their priority to determine what the attack is<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">targeting. If it\u2019s not attacking your entire network then their first step should be to isolate the attacked part of your site from the rest. This will<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">ensure that, whilst one element of your site may be down, the rest of it should be able to operate without much disruption (as long as what\u2019s being <\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">attacked isn\u2019t core to the entire system.)<\/span><\/p>\n<p><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\">There\u2019s an excellent article by<\/span> <span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"><a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/tech-insight--how-to-respond-to-a-denial-of-service-attack\/d\/d-id\/1136074?itc=edit_stub\" target=\"_blank\" rel=\"nofollow\">Dark Reading<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> about the correct steps to take when countering a DDoS attack, and I recommend you read that as well if you want to develop a deeper understanding of how<\/span><br>\n<span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> to respond to a DDoS Attack. Denial-of-service attacks are on the rise, most likely because there is no way to prevent them outright. Therefore, the best<\/span><br>\n<span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> thing a business can do is prepare themselves with knowledge, so that they can best respond if they ever do find themselves under attack.<\/span><\/p>\n<p><span style=\"font-size: 14pt; color: #333399;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif;\"><strong>Infographic<\/strong><\/span><span style=\"font-family: tahoma,arial,helvetica,sans-serif;\">:<\/span><\/span><br>\n<span style=\"font-size: 12pt; font-family: tahoma,arial,helvetica,sans-serif;\"> <a href=\"http:\/\/www.prolexic.com\/images\/1000px-Q3-2013-Attack-Report-Infographic.jpg\" target=\"_blank\" rel=\"nofollow\"><br>\nhttp:\/\/www.prolexic.com\/images\/1000px-Q3-2013-Attack-Report-Infographic.jpg<br>\n<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/p>\n<p><a title=\"\" href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20Understanding%20a%20DDoS%20Attack%20\/blog\/understanding-a-ddos-attack\/?ref=blog\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1028\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" alt=\"Tweet this\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><a title=\"\" href=\"https:\/\/plus.google.com\/share?url={\/blog\/understanding-a-ddos-attack\/?ref=blog}\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1053\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" alt=\"Share on Google+\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><em>Photo Credit: <a href=\"http:\/\/www.flickr.com\/photos\/22850192@N03\/8290599649\/\" rel=\"nofollow\" target=\"_blank\">Kevin B 3<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> via <a href=\"http:\/\/compfight.com\" rel=\"nofollow\" target=\"_blank\">Compfight<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> <a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\" rel=\"nofollow\" target=\"_blank\">cc<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New research released this month has shown that DDoS attacks are on the rise in the UK and USA. DDoS attacks, otherwise known as Distributed Denial of Service attacks, are when someone or something tries to make an online service unavailable by bombarding it with huge streams of traffic from different sources. They can target [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2226,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,9],"tags":[],"class_list":["post-2221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-technical"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2221"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2221\/revisions"}],"predecessor-version":[{"id":3510,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2221\/revisions\/3510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2226"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}