SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
1
DDoS Boot Camp: Basic Training for an Increasing Cyber Threat
Computer hacking has moved far beyond the days of pranks launched by teenagers from a family
computer. Today, data breaches and other online attempts to wreak havoc on businesses or
individuals are criminal-led, malicious acts.
During the past decade, distributed denial of Service (DDoS) attacks have become one of the most
common and destructive forms of online hacking. Website visitors are affected when they try to
purchase products, access their accounts, or use applications and are greeted with a “Page Not
Found” or other error message, instead of the information they expected. These malicious
attempts to take down websites continue to escalate.
The downtime caused by a DDoS attack can result in extensive financial losses. For example,
Forrester estimates that the average financial damage from four hours of website downtime is
US$2.1 million dollars – and US$27 million for 24-hour outage. Forrester also reports that
financial services companies lost an estimated US$17 million per DDoS attack in 2012.
What is a DDoS denial of service attack?
DDoS attacks are attempts to make a computer resource (i.e. website, e-mail, VoIP, or a whole
network) unavailable to its intended users. Overwhelmed with massive amounts of unsolicited
data and/or requests, the target system either responds so slowly as to be unusable or crashes
completely. The data volumes required to do this are typically achieved by a network of remotely
controlled zombie or botnet (robot network) computers. These computers have fallen under the
control of an attacker, generally as a result of infection from a Trojan virus.
DDoS attack types
Botnets are used to launch different types of DDoS attacks. Each type is characterized by the way it
affects web-facing routers, servers, and other elements in a network. Two general types of attacks
and their targets include:
• Layer 3 and Layer 4 attacks that target network infrastructure. Layer 3 (network layer)
and Layer 4 (transport layer) DDoS attacks rely on extremely high volumes (floods) of
data to slow website performance and deny access to legitimate users.
• Layer 7 attacks that target applications. In contrast to infrastructure attacks, Layer 7
(application layer) attacks are especially complex, stealthy, and difficult to detect
because they resemble legitimate website traffic.
2
Where do DDoS attacks come from?
DDoS attacks are a global issue. Organizations all over the world are targeted. Almost every
country is a source of DDoS attacks. Many attacks originate from compromised servers at hosting
providers that are slow to respond to malware clean-up requests, as well as servers that are out of
reach of international authorities.
Historically, China has been the leading source of botnet activity, and this position was maintained
in Q1 2013 with China generating 40 percent of botnet activity against Prolexic’s global client
base. For the same quarter, the United States was the second leading source of botnet activity,
launching 22 percent of DDoS attacks.
Why do organizations get hit by DDoS attacks?
The first question asked by executives of companies hit by a DDoS attack is, “Why me?” Most
victims have no idea why they were attacked, and they will likely never find out the identity of the
attackers. Motives can range from political activism to extortion to random attacks by amateurs.
Reasons for an attack may be hactivism, extortion, competition, disgruntled individuals and
hacker experimentation.
Affected industries
No organization is safe from becoming a target of a DDoS attack. Companies large and small are hit
daily. Some of the biggest and best-known global brands in the following industries have been
taken offline by DDoS distributed denial of service attacks.
• e-Commerce
• Education
• Energy
• Finance, banking and insurance
• Government and defense
• Healthcare
• Internet and telecom
• Media and entertainment
• Non-profits
• Retail
• Technology
• Travel
Download the white paper for more details, information about DDoS mitigation services and a
case study of a company that successfully protected itself from DDoS attacks.
About Prolexic
Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and
mitigation services. Learn more at www.prolexic.com.

Más contenido relacionado

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Destacado (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

DDoS Boot Camp: Basic Training for an Increasing Cyber Threat

  • 1. 1 DDoS Boot Camp: Basic Training for an Increasing Cyber Threat Computer hacking has moved far beyond the days of pranks launched by teenagers from a family computer. Today, data breaches and other online attempts to wreak havoc on businesses or individuals are criminal-led, malicious acts. During the past decade, distributed denial of Service (DDoS) attacks have become one of the most common and destructive forms of online hacking. Website visitors are affected when they try to purchase products, access their accounts, or use applications and are greeted with a “Page Not Found” or other error message, instead of the information they expected. These malicious attempts to take down websites continue to escalate. The downtime caused by a DDoS attack can result in extensive financial losses. For example, Forrester estimates that the average financial damage from four hours of website downtime is US$2.1 million dollars – and US$27 million for 24-hour outage. Forrester also reports that financial services companies lost an estimated US$17 million per DDoS attack in 2012. What is a DDoS denial of service attack? DDoS attacks are attempts to make a computer resource (i.e. website, e-mail, VoIP, or a whole network) unavailable to its intended users. Overwhelmed with massive amounts of unsolicited data and/or requests, the target system either responds so slowly as to be unusable or crashes completely. The data volumes required to do this are typically achieved by a network of remotely controlled zombie or botnet (robot network) computers. These computers have fallen under the control of an attacker, generally as a result of infection from a Trojan virus. DDoS attack types Botnets are used to launch different types of DDoS attacks. Each type is characterized by the way it affects web-facing routers, servers, and other elements in a network. Two general types of attacks and their targets include: • Layer 3 and Layer 4 attacks that target network infrastructure. Layer 3 (network layer) and Layer 4 (transport layer) DDoS attacks rely on extremely high volumes (floods) of data to slow website performance and deny access to legitimate users. • Layer 7 attacks that target applications. In contrast to infrastructure attacks, Layer 7 (application layer) attacks are especially complex, stealthy, and difficult to detect because they resemble legitimate website traffic.
  • 2. 2 Where do DDoS attacks come from? DDoS attacks are a global issue. Organizations all over the world are targeted. Almost every country is a source of DDoS attacks. Many attacks originate from compromised servers at hosting providers that are slow to respond to malware clean-up requests, as well as servers that are out of reach of international authorities. Historically, China has been the leading source of botnet activity, and this position was maintained in Q1 2013 with China generating 40 percent of botnet activity against Prolexic’s global client base. For the same quarter, the United States was the second leading source of botnet activity, launching 22 percent of DDoS attacks. Why do organizations get hit by DDoS attacks? The first question asked by executives of companies hit by a DDoS attack is, “Why me?” Most victims have no idea why they were attacked, and they will likely never find out the identity of the attackers. Motives can range from political activism to extortion to random attacks by amateurs. Reasons for an attack may be hactivism, extortion, competition, disgruntled individuals and hacker experimentation. Affected industries No organization is safe from becoming a target of a DDoS attack. Companies large and small are hit daily. Some of the biggest and best-known global brands in the following industries have been taken offline by DDoS distributed denial of service attacks. • e-Commerce • Education • Energy • Finance, banking and insurance • Government and defense • Healthcare • Internet and telecom • Media and entertainment • Non-profits • Retail • Technology • Travel Download the white paper for more details, information about DDoS mitigation services and a case study of a company that successfully protected itself from DDoS attacks. About Prolexic Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. Learn more at www.prolexic.com.