Distributed Denial of Service (DDoS) attacks are malicious attempts performed by hackers or attackers to block normal traffic on particular targeted server by overwhelming the target by flooding that server with loads of fake or dummy Internet traffic.

DDoS attacks are performed by using multiple computer systems as sources. These sources starts the attack at exact same timings. DDoS attacks acts like traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.

How does a DDoS attack work?

Attackers need to control a network of computer systems through which the attack will be done simultaneously. The server or system which are attacked are infected with viruses and malware, and sometimes into an advanced bot. Attack does not stops here. The attackers have full remote control over the infected systems and bots. These kind of bots are known as botnet.

A botnet once established, attackers are able to command infected machines by sending instructions to them. DDoS attacks are difficult to resolve since bots are internet legitimate devices and are so it becomes tough to remove them from internet traffic coming to that server, machine or network.

What are common types of DDoS attacks?

Application Layer Attacks

Protocol Attacks

Volumetric Attacks

What should be done to prevent and fight against DDoS attacks?

Identification of DDoS attacks should be performed on constant basis.

Have more bandwidth to your web server than it should have.

If an attack is identified, the first step which should be taken is to contact your ISP (Internet Service Provider).

You can also call up DDoS Specialists