A Distributed Denial‑of‑Service (DDoS) attack floods a target’s network or application with bogus traffic, overwhelming resources and rendering services unavailable to legitimate users. Attackers harness botnets—networks of compromised devices—to generate massive traffic volumes or exploit protocol weaknesses.
A DDoS attack floods a target with traffic from many compromised devices (a botnet). The traffic can be legitimate‑looking requests or malformed packets that consume bandwidth, CPU, or memory, preventing real users from accessing the service.
The attacks fall into Application‑layer, Protocol, and Volumetric groups. Application attacks target specific software functions, protocol attacks abuse networking protocols, and volumetric attacks overwhelm the network’s bandwidth.
These attacks mimic normal user behavior to hit vulnerable services. Common sub‑types include DNS server attacks that use spoofed queries and HTTP/S encrypted floods that overwhelm web servers with massive GET/POST requests.
Attackers send a flood of DNS queries—often spoofed—to overload the server. Amplification techniques can turn a small query into a large response, magnifying the traffic directed at the target.
Botnets generate a high volume of HTTP or HTTPS requests to a web server, exhausting its connection pool and CPU. Because the traffic looks like normal web traffic, it can be hard to filter.
Protocol attacks target the underlying communication mechanisms. Examples include:
Attackers send thousands of SYN packets with spoofed source IPs. The server allocates resources for each half‑open connection, eventually exhausting its capacity and denying legitimate connections.
Volumetric attacks focus on saturating bandwidth using massive traffic volumes, often via amplification. They are measured in gigabits or terabits per second.
Attackers send small spoofed DNS queries to open resolvers, which reply with large responses to the victim’s IP, inflating traffic volume dramatically.
UDP floods send random packets to many ports, while ICMP (ping) floods flood the network with echo requests. Both consume bandwidth and processing power.
Attackers send a high rate of spoofed TCP RST or FIN packets, forcing the target to close connections repeatedly, disrupting legitimate traffic.
Monitoring traffic spikes, unusual protocol usage, and sudden drops in performance can indicate an attack. Integrating with a service like Palisade’s Email Security Score helps gauge overall exposure.
Implement network‑level filtering, rate limiting, and use DDoS‑mitigation services that can absorb large traffic volumes. Regularly update and patch applications to reduce exploitable vulnerabilities.