What is DDoS?
DDoS stands for Distributed Denial of Service. It’s an attempt to make an online service unavailable to end-users through malicious practices. The unauthorized practices include temporarily interrupting or suspending the host server. It often floods the target with malicious traffic coming from multiple sources. DDoS mitigation techniques work towards defending the target from potential DDoS attacks.
Understand DDoS Attacks: Categories & Types
Different types of DDoS Attacks include:
Protocol Attacks
Some of the protocol attacks include:
- fragmented packet attacks
- SYN floods
- Ping of Death
- Smurf DDoS
Usually, these attacks consume Server resources and communication equipment that include load balancers and firewalls. However, the units to measure this attack are Pps, Packets per second.
Application Layer Attacks
These attacks are generally low and slow and target Windows, OpenBSD, and Target vulnerabilities. Such attacks, however, aim towards crashing the webserver while you can measure its magnitude in Rps, Requests per second.
Volume Based Attacks
This type of attack includes ICMP floods, UDP floods, and spoofed packet floods that aim towards saturating the bandwidth of the targeted site. You can, however, measure its magnitude in bps, bits per second.
What kind of business gets attacked?
DDoS attacks do not restrict to any particular business or online store. It can attack any business, including gaming or gambling stores, accounting sites, retail, and even Cloud infrastructures are not an exception.
What does Cloud Service Providers do about DDoS attacks?
As your network provider, they ensure that your data stay unaffected from any DDoS attacks. A variety of in-house applications works toward detecting attacks and identifying their target before they intersect Cloud.
DDoS mitigation techniques work consistently to protect the data stored on Cloud from any potential attacks. However, the mitigation services work in four different stages that include Detection, Diversion, Filtering, and Analysis.
How DDoS Mitigation Procedure Works?
Cloud service providers work seamlessly to block an attack without affecting the user experience or without any interception in the on-going processes.
Detection
The detection phase detects abnormal traffic and its sources.
Diversion
The diversion phase reroutes or redirects the traffic to alternate paths from the target. Redirection of traffic via discarding partially or completely refers to as Diversion.
2 thoughts on “DDoS Attacks Types, Mitigation Techniques & Procedures”