A DDoS attack is a cyberattack where attackers disrupt normal operations by overwhelming servers, systems or networks. They accomplish this by using up the limited bandwidth and processing power of these Information Technology (IT) infrastructures, preventing them from responding to legitimate users’ connection requests and data packets.
DDoS attacks are a subset of Denial-of-Service (DoS) attacks. While DoS attacks originate from a single source, DDoS attacks employ multiple coordinated sources on the target, amplifying the impact achieved.
While Distributed Denial-of-Service (DDoS) attacks are no longer headline news, they remain a critical part of the modern attacker’s playbook—often serving as a smokescreen for more damaging breaches. Today’s cybercriminals don’t just aim to disrupt; they aim to distract. A well-timed DDoS can mask lateral movements, exfiltrate data unnoticed, or even delay incident response. So even if it seems like an ‘old-school’ tactic, ignoring DDoS opens the door to more serious compromises.
DDoS attacks primarily operate through botnets, which are networks of compromised devices, such as computers and Internet-of-Things (IoT) devices, that have been infected with malware without the owners' knowledge. Botnets can be created or easily acquired through the dark web, open-source tools, or DDoS-for-Hire Services.
Attackers control these botnets via Command and Control (C&C) servers to coordinate the timing, targets, and methods of attacks. The botnets either flood the target infrastructure with excessive traffic or exploit vulnerabilities to deplete resources, causing systems, servers, or networks to slow down or crash. The increase in unsecured IoT devices like appliances or sensors, has made botnets more prevalent and accessible, allowing even those with minimal technical expertise to execute DDoS attacks.
DDoS attacks are generally classified into three main types: volumetric attacks, network protocol attacks and application layer attacks. Note that attackers can employ multiple attack vectors synchronously to increase their effectiveness and complicate mitigation efforts.
Volumetric attacks, the most common type of DDoS attacks, target the network and transport layers (Layers 3 and 4 of the OSI Model). These attacks flood a network with excessive traffic, overwhelming its capacity and blocking legitimate requests. Botnets are often used to generate this traffic, employing IP spoofing to disguise the source of the attacks, making them harder to trace and block. Common examples include:
Network protocol attacks exploit vulnerabilities in protocols like ICMP and UDP at the network and transport layers (Layers 3 and 4 of the OSI Model) to overwhelm target resources. Unlike volumetric attacks, which focus on generating massive traffic, protocol attacks manipulate network behaviour. Some examples include:
Slowloris attack: Attackers send small and incomplete HTTP requests to the target server slowly over an extended period. This exhausts the server’s memory and CPU by keeping all connections open, gradually consuming resources until the server can no longer function.
Organisations that heavily depend on their networks and websites, possess high-value assets, or operate critical infrastructures are particularly vulnerable. Understanding the motivations helps organisations better prepare and defend against potential DDoS threats.
Common targets of these attacks include financial institutions, e-commerce sites, government agencies, cloud service providers, SaaS companies, and gaming platforms.
These symptoms often indicate a DDoS attack, though they can also stem from stem from server malfunctions, network problems, or genuine high traffic volumes.
In the face of DDoS attacks, the incident response should aim to divert the flow of malicious traffic as quickly as possible. However, once an attack has occurred, damage is inevitable. As such, establishing a strong defence to prevent DDoS attacks from happening in the first place is crucial. Here are some measures organisations can implement to prevent and mitigate DDoS attacks:
Network Traffic Analysis (NTA) continuously monitors real-time traffic to detect anomalies or surges that may indicate a DDoS attack. Integrated with Security Information and Event Management (SIEM) systems, NTA alerts security teams for prompt action.
Machine learning enhances NTA by identifying complex patterns and adapting to new attack methods, improving detection speed and accuracy. By analysing data from multiple sources, including DDoS attack maps, these proactive measures help reduce false positives and keep organisations ahead of evolving threats.
WAFs, which specialises in defending against Layer 7 threats, verify the safety and legitimacy of data packets before allowing them to reach the servers or applications. This ensures that only authorised and benign traffic is allowed.
NIDPS detect and respond to malicious network traffic by detecting known threat patterns and anomalies, employing heuristic-based techniques to identify deviations from normal behaviours. These systems are particularly effective against known threats and can quickly take action to block DDoS attempts and implement countermeasures to safeguard the servers or networks.
CDNs distribute incoming traffic across numerous servers globally. This reduces the burden on one server and helps absorb large volumes of malicious traffic, preventing the main server from being overwhelmed.
Rate limiting involves limiting the number of requests from a specific user or IP address. In volumetric DDoS attacks, the server can block additional requests, effectively stopping the attack.
DDoS attacks not only disrupt services but also camouflage other breaches, making detection and mitigation a daunting task. To effectively counteract the evolving Tactics, Techniques, and Procedures used in DDoS attacks, it is crucial to implement a solid and dynamic defence strategy.
Ensign’s Managed Security Services go beyond basic detection to offer proactive defence against DDoS and the stealthier attacks that often follow. Our SOC teams provide 24/7 monitoring, automated traffic diversion, and threat correlation across vectors—so your business stays resilient even when the attackers play dirty. Speak to an advisor today.