Providers that protect against DDoS attacks

Distributed Denial of Service (DDoS) attacks are a plague with consequences just as horrific as ransomware attacks. As a blackmail scheme, a targeted attack, or a form of virtual vandalism, a swarm of attackers floods a website with an influx of requests in an attempt to shut it down. In the past, attackers often used reflection attacks, which involve an attacker sending several packets with the IP address of the victim as the sender to servers, which then acknowledge the requests with long answers. Because of the spoofed IP address, however, these massive responses go to the victim's address.

Even companies with Internet connectivity in the 10 to 40Gbps range can be powerless against attacks with several hundreds of gigabits per second bandwidth. An Internet search with the keywords "biggest DDoS" regularly shows new and increasing values for such attacks; the peak is currently around 1Tbps. With the Internet of Things, attackers can now choose platforms that are much easier to use; for example, hacked surveillance cameras, refrigerators, and cheap routers have been responsible for recent attacks. In this article, I look at methods, providers, and the costs of protecting your connectivity.

The DDoS Family

Roughly three categories of DDoS attacks can be distinguished. Flooding, as the method described above is known, occurs when a large group of computers send many large data packets to a victim, exhausting the bandwidth or loading the infrastructure to its full capacity from the excessive number of individual packets.

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • DDos Attack Map Charts Denial of Service

    A new web application helps users visualize distributed denial-of-service attacks.

  • ARP Spoofing Attacks

    ARP spoofing can be used to initiate denial-of-service attacks, network hijacking, and man-in-the-middle attacks on the Intranet. We look at how to prevent these incursions.

  • ARP Spoofing

    Any user on a LAN can sniff and manipulate local traffic. ARP spoofing and poisoning techniques give an attacker an easy way in.

  • Backdoors

    Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.

  • Honeynet

    Security-conscious admins can use a honeynet to monitor, log, and analyze intrusion techniques.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News