A distributed denial-of-service (DDoS) attack is an attack that is focused on disrupting the availability of networks, targeted web server or services by overwhelming the target or its surrounding infrastructure with a flood of illegitimate Internet traffic. DDoS attack requires an attacker to gain control of a network of compromised online machines (computers and IoT devices) in order to carry out an attack. These machines are infected with malware, turning each one into a bot. The attacker then has remote control over the group of bots, which is called a botnet. There are three (3) different types of DDoS attacks: Volumetric attack, Application layer attack and State Exhaustion or Protocol attack
Once a botnet has been established, the attacker is able to direct the machines by sending updated instructions to each bot via a method of remote control. When the IP address of a victim is targeted by the botnet, each bot will respond by sending requests to the target, potentially causing the targeted server or network to overflow capacity, resulting in a denial-of-service to normal traffic. Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.
As business operations move online, the industries targeted, as well as the size, frequency and complexity of DDoS attacks have increased commensurately. Any business that is connected through networks to its customers, partners, supply-chain or employees are at risk from advanced DDoS attacks. WISR [World Infrastructure Security Report] shows that:
- Average DDoS attack sizes are now above 1Gbps, a key threshold in that an average attack can saturate the Internet connectivity of many enterprises.
- Low and slow, harder to detect application-layer attacks increased from 25 percent to 32 percent in 2017.
- 48 percent of the enterprises observed a multi-vector DDoS attack; up from 40 percent the previous year, 2018.
- 52 percent of enterprise respondents had firewalls that experienced a failure or contributed to an outage during a DDoS attack.
At TigerLogic we understand the ever-increasing frequency and sophistication of DDoS Attacks on enterprises and that the success of the business depends on reliable and secure online infrastructure.
We enable enterprises to deliver their business objectives while meeting security and regulatory requirement via our comprehensive DDoS protection solution that is designed to adequately protect the organization from today’s DDoS threat. We partner with the leading vendor in this space.