{"id":31796,"date":"2020-09-18T09:35:08","date_gmt":"2020-09-18T01:35:08","guid":{"rendered":"https:\/\/dp2024.sim-dp.com\/?p=31796"},"modified":"2020-09-18T09:36:51","modified_gmt":"2020-09-18T01:36:51","slug":"what-is-a-ddos-attack","status":"publish","type":"post","link":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/","title":{"rendered":"What Is A DDoS Attack"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact, DDoS attacks are a primary concern in Internet security today. Unlike other kinds of cyberattacks, DDoS assaults don\u2019t attempt to breach your security perimeter. It aims to make an online service unavailable by sending a large volume of malicious traffic from large clusters of connected online devices (collectively known as a botnet) to a target server, service, or network. The target device will be overloaded with fake traffic and fail to respond to legitimate traffic. In other words, a DDoS attack is like a traffic jam clogging up a highway, preventing regular traffic from arriving at its desired destination.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\"  src=\"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/05\/ddos_new_en.jpg\" alt=\"\" \/><\/p>\n<p><b>Types of DDoS attacks<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">DDoS attacks can be divided into three general categories: volumetric attacks, protocol attacks, and application layer attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b><\/b><b><span style=\"font-weight: 400;\"><strong>1.\u00a0 <\/strong><\/span>Volumetric attacks\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Volumetric attacks are the most common type of DDoS attacks. These involve massive amount of traffic (sometimes in excess of 100 Gbps) to inundate the network bandwidth. Hackers utilize many computers and internet connections that are often distributed around the world to send a hefty amount of traffic packets to the target website. It completely saturates the website\u2019s available bandwidth, creating a traffic jam that makes it impossible for legitimate traffic to flow into or out of the targeted site. The magnitude of such an attack is measured in bits per second (bps). Examples of volumetric attacks include UDP floods, ICMP floods, and other spoofed-packet floods.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b><\/b><b><span style=\"font-weight: 400;\"><strong>2.\u00a0 <\/strong><\/span>Protocol attacks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Unlike volumetric attacks, protocol attacks aim to exhaust server resources instead of bandwidth. It focuses on exploiting a weakness in the Layer 3 and Layer 4 protocol stack. It consumes all the processing capacity of the network infrastructure resources like servers, firewalls, and load balancers by making phony protocol requests, causing service disruption.\u00a0 The strength of protocol attacks is measured in packets per second (pps). Examples of protocol attacks include SYN floods, fragmented packet attacks, Ping of Death and Smurf DDoS.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b><\/b><span style=\"font-weight: 400;\"><strong>3.\u00a0 <\/strong><\/span><b>Application layer attacks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Application layer attacks are the most sophisticated and serious type of attacks. Generally, they require fewer resources than volumetric attacks and protocol attacks. They focus on exploiting a weakness in the Layer 7 protocol stack. Attack traffic is usually legitimate. It establishes a connection with the target and then seeks to overload a server by sending a large number of seemingly legitimate and innocent requests requiring resource-intensive handling and processing. Eventually, the entire database connection pool of the server is busy and it blocks the legitimate requests. Application layer attacks are comparatively harder to mitigate. The magnitude is measured in requests per second (rps). Examples of application layer attacks include Slowloris and HTTP flood.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although most common DDoS attacks broadly fall into these three categories, some attacks can be a combination. Hackers may launch a protocol attack to create a distraction and then launch an application layer attack since they take more time to find the vulnerabilities within the application layer. This is a new trend that is called \u201cblended attacks\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DDoS attack methods are evolving every day. They are increasing in frequency, complexity and size. Don\u2019t want to be the victim of DDoS attacks? Chat with our experts to learn more about our<\/span><a href=\"https:\/\/dp2024.sim-dp.com\/en\/product\/ddos-dedicated-server\/\"> <span style=\"font-weight: 400;\">anti-DDoS protection service<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact, DDoS attacks are a &#8230; <a class=\"understrap-read-more-link\" href=\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\">read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1,93],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is A DDoS Attack | Dataplugs<\/title>\n<meta name=\"description\" content=\"As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact,\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is A DDoS Attack | Dataplugs\" \/>\n<meta property=\"og:description\" content=\"As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Dataplugs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dataplugs\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T01:35:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-18T01:36:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/05\/ddos_new_en.jpg\" \/>\n<meta name=\"author\" content=\"Felix Cheung\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dataplugs\" \/>\n<meta name=\"twitter:site\" content=\"@dataplugs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Felix Cheung\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\"},\"author\":{\"name\":\"Felix Cheung\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/person\/969f09c2c1bd2a73d3dc8b7c464a2d61\"},\"headline\":\"What Is A DDoS Attack\",\"datePublished\":\"2020-09-18T01:35:08+00:00\",\"dateModified\":\"2020-09-18T01:36:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\"},\"wordCount\":551,\"publisher\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#organization\"},\"articleSection\":[\"Industry News\",\"Web Security\"],\"inLanguage\":\"en-US\",\"about\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\"},\"thumbnailUrl\":\"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/09\/blog_ecom-1.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\",\"url\":\"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/09\/blog_ecom-1.jpg\",\"name\":\"What Is A DDoS Attack | Dataplugs\",\"isPartOf\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#website\"},\"datePublished\":\"2020-09-18T01:35:08+00:00\",\"dateModified\":\"2020-09-18T01:36:51+00:00\",\"description\":\"As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact,\",\"breadcrumb\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/\"]}],\"contentUrl\":\"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/09\/blog_ecom-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dp2024.sim-dp.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is A DDoS Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#website\",\"url\":\"https:\/\/dp2024.sim-dp.com\/en\/\",\"name\":\"Dataplugs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dp2024.sim-dp.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#organization\",\"name\":\"Dataplugs Limited\",\"url\":\"https:\/\/dp2024.sim-dp.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2021\/09\/logo_en-1.png\",\"contentUrl\":\"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2021\/09\/logo_en-1.png\",\"width\":1,\"height\":1,\"caption\":\"Dataplugs Limited\"},\"image\":{\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dataplugs\/\",\"https:\/\/twitter.com\/dataplugs\",\"https:\/\/www.instagram.com\/dataplugs\/\",\"https:\/\/www.linkedin.com\/company\/dataplugs-limited\"]},{\"@type\":\"LocalBusiness\",\"@id\":\"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/person\/969f09c2c1bd2a73d3dc8b7c464a2d61\",\"name\":\"Dataplugs Limited\",\"image\":\"https:\/\/www.dataplugs.com\/wp-content\/uploads\/2018\/06\/logo_en.png\",\"telephone\":\"+852 3959 1888\",\"address\":{\"@type\":\"PostalAddress\",\"streetAddress\":\"Suite 3602, 36\/F., AIA Kowloon Tower, 100 How Ming Street, Kwun Tong, Kowloon, Hong Kong\",\"addressLocality\":\"Hong Kong\",\"addressCountry\":\"HK\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is A DDoS Attack | Dataplugs","description":"As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact,","robots":{"index":"index","follow":"follow"},"canonical":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"What Is A DDoS Attack | Dataplugs","og_description":"As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact,","og_url":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/","og_site_name":"Dataplugs","article_publisher":"https:\/\/www.facebook.com\/dataplugs\/","article_published_time":"2020-09-18T01:35:08+00:00","article_modified_time":"2020-09-18T01:36:51+00:00","og_image":[{"url":"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/05\/ddos_new_en.jpg"}],"author":"Felix Cheung","twitter_card":"summary_large_image","twitter_creator":"@dataplugs","twitter_site":"@dataplugs","twitter_misc":{"Written by":"Felix Cheung","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/"},"author":{"name":"Felix Cheung","@id":"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/person\/969f09c2c1bd2a73d3dc8b7c464a2d61"},"headline":"What Is A DDoS Attack","datePublished":"2020-09-18T01:35:08+00:00","dateModified":"2020-09-18T01:36:51+00:00","mainEntityOfPage":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/"},"wordCount":551,"publisher":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/#organization"},"articleSection":["Industry News","Web Security"],"inLanguage":"en-US","about":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/"},"thumbnailUrl":"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/09\/blog_ecom-1.jpg"},{"@type":"WebPage","@id":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/","url":"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/09\/blog_ecom-1.jpg","name":"What Is A DDoS Attack | Dataplugs","isPartOf":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/#website"},"datePublished":"2020-09-18T01:35:08+00:00","dateModified":"2020-09-18T01:36:51+00:00","description":"As the volume of data is growing exponentially on the internet, distributed denial-of-service (DDoS) attacks are becoming increasingly common. In fact,","breadcrumb":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/"]}],"contentUrl":"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2020\/09\/blog_ecom-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/dp2024.sim-dp.com\/en\/what-is-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dp2024.sim-dp.com\/en\/"},{"@type":"ListItem","position":2,"name":"What Is A DDoS Attack"}]},{"@type":"WebSite","@id":"https:\/\/dp2024.sim-dp.com\/en\/#website","url":"https:\/\/dp2024.sim-dp.com\/en\/","name":"Dataplugs","description":"","publisher":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dp2024.sim-dp.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dp2024.sim-dp.com\/en\/#organization","name":"Dataplugs Limited","url":"https:\/\/dp2024.sim-dp.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2021\/09\/logo_en-1.png","contentUrl":"https:\/\/dp2024.sim-dp.com\/wp-content\/uploads\/2021\/09\/logo_en-1.png","width":1,"height":1,"caption":"Dataplugs Limited"},"image":{"@id":"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dataplugs\/","https:\/\/twitter.com\/dataplugs","https:\/\/www.instagram.com\/dataplugs\/","https:\/\/www.linkedin.com\/company\/dataplugs-limited"]},{"@type":"LocalBusiness","@id":"https:\/\/dp2024.sim-dp.com\/en\/#\/schema\/person\/969f09c2c1bd2a73d3dc8b7c464a2d61","name":"Dataplugs Limited","image":"https:\/\/www.dataplugs.com\/wp-content\/uploads\/2018\/06\/logo_en.png","telephone":"+852 3959 1888","address":{"@type":"PostalAddress","streetAddress":"Suite 3602, 36\/F., AIA Kowloon Tower, 100 How Ming Street, Kwun Tong, Kowloon, Hong Kong","addressLocality":"Hong Kong","addressCountry":"HK"}}]}},"_links":{"self":[{"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/posts\/31796"}],"collection":[{"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/comments?post=31796"}],"version-history":[{"count":4,"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/posts\/31796\/revisions"}],"predecessor-version":[{"id":31803,"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/posts\/31796\/revisions\/31803"}],"wp:attachment":[{"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/media?parent=31796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/categories?post=31796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dp2024.sim-dp.com\/en\/wp-json\/wp\/v2\/tags?post=31796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}