The Threat Spectrum of DDoS Attacks

By Enterprise Security Magazine | Monday, April 01, 2019

Distributed Denial of Service (DDoS)FREMONT, CA: The digital transformation has given way for many emerging technologies which have helped to create many innovative solutions and services. Organizations use these technologies to make optimum use of their resources and workforce. However, cybersecurity has become one of the most significant issues as cybercriminals have also started leveraging technology tools to hack into a company’s system.

Distributed Denial of Service (DDoS) attacks are one of the most sophisticated forms of cyber attack where the hackers take down a system by bombarding it with malicious traffic. The DDoS attackers use many internet protocols (IP) to request acknowledgments from a server as part of an ongoing interaction. A sudden increase in the number of acknowledgments can result in server failure, allowing cybercriminals to enter into a system. In another form of DDoS attacks, the hackers send malicious requests from a forged IP address, which tricks the target server into sending a response to a different server, which is the ultimate target. In this form of DDoS attack, companies are duped into playing a role in the attack, and the target organizations fall prey to the fraud as they see traffic from a trustworthy site and services.

The emergence of intelligent technologies like artificial intelligence (AI), machine learning (ML), IoT, and many others have added to the sophistication of DDoS attacks. These technologies allow bad actors to hack into millions of Smartphones, computers, and other IoT device to launch a massive attack on a bigger target. There are many inexpensive DDoS attack tools available in the black market which the hackers use to launch an attack on a system.

Enterprises can use the scrubbing process to mitigate the risk of DDoS attacks. For scrubbing, enterprises need to have on-premise equipment with sufficient capacity to filter out the DDOS traffic while allowing legitimate requests to pass through. Many organizations have begun implementing high mitigation capacities which can lead to more than 10 Terabit per second to deal with volumetric attacks in a straightforward fashion. 

Weekly Brief