About us
The product has been added to the shopping cart Show shopping cart
Your current path:

How a DDoS attack works

Reading time: 3 minutes

Table of contents

DDoS stands for Distributed Denial of Service. In German: Distributed denial of service. This is a distributed network attack that exploits the limitations of capacities. The capacity is overloaded by several requests to a resource. This article explains how this works and how you can protect yourself against it.

This is a DDos attack

Network resources are limited. Web servers, for example, can only process a certain number of requests at the same time. Otherwise they are slowed down or crash due to overload. This is where a DDoS attack comes in. By exceeding the capacity that can be processed simultaneously, the web server is forced to slow down the service considerably or the service crashes completely. The reasons for such attacks are often ransom payments. However, it is also possible, for example, that a company or an operator of the website in question is simply being deliberately harmed. So-called botnets are usually used for an attack. These are zombie networks with already infected computers. These infected computers simultaneously request a web server, for example, which then becomes overloaded. Before the DDoS attack is carried out, malware is always spread on computers first. This creates the zombie network. The attacker in the form of a hacker can remotely control these infected zombie computers through the installed malware, so to speak. This makes it possible to direct all requests to a website at the same time and overload it.

Protection against DDoS attacks

A DDoS attack can be aimed at economic damage, but also at data theft. In any case, it is better to build up protection against a DDoS attack. Due to the easy spread of malware, DDoS attacks are relatively easy for hackers to carry out, especially nowadays. The complete interconnectedness of the Internet makes it easier than ever to spread malware and build a zombie network. Protection against DDoS attacks is not provided by antivirus software alone. As the attack is not directly a virus or other type of malware, an antivirus program or firewall cannot do anything against it. As already mentioned, the attack takes the form of numerous, simultaneous requests on a server. To protect the server against this, there are certain protection solutions that specialize in DDoS attacks. These protection programs sort the incoming traffic on the server and differentiate between genuine requests and malicious requests. A major advantage of many protection programs is that they can only be used when necessary. They therefore do not have to run permanently. If the traffic on the server is unusually high, the program can be used to organize the traffic. Once the attack is over, the program is switched off again. If a server is frequently attacked, simply leave the protection program running continuously. Some of the strongest DDoS attacks took place in 2018. In some cases, bundled traffic peaks of up to 1.7 Tbit/s were measured.

Conclusion

Distributed Denial of Service – or DDoS – is a massive attack on servers. Sometimes it also takes place on end devices. The overload can not only be a nuisance, but can cause entire systems to collapse. The aim is usually to reverse the attack in return for payment so that normal operations on the server can continue. However, it is also possible that an attack is only aimed at the damage itself and is used for manipulation. Proper protection is only possible with special programs.