What is a DDoS attack your it and tech mates

What is a DDoS attack

What is a DDoS attack melbourne cybersecurity consultant your it and tech mates

What is a DDoS attack

What is a DDoS attack?

Powered By: IBM Technology

What is a DDoS Attack video is powered by IBM Technology.



What is a DDoS attack melbourne cybersecurity consultant your it and tech mates

Top 10 Cybersecurity Threats

What is a distributed denial of service attack?

Learning with Expert: TTB Total Security.

We are your Cyber Security and Data Protection Specialists.

network security

Your IT and Tech Mates Tips: Your Business-critical server outages and monetary losses can result from distributed denial of service attacks (DDOS attacks). When DDoS events are detected and prevented early enough, they can be stopped before they overwhelm company networks.


DDoS expands to “Distributed Denial of Service”, and is a major concern for internet service providers in the current times. Technically, it is a malicious attempt that disrupts the normal traffic of a server, service, or network by overwhelming its infrastructure with a flood of internet traffic.


DDoS attacks are effective as they utilize multiple infected systems as sources of the attack traffic. These systems can be desktops or other IoT devices. In other words, a DDoS attack is just like a traffic jam preventing the movement of vehicles.


Now, how does a DDoS attack actually work?


DDoS attacks are carried out using a network of systems that are on a network. The systems used to get traffic are infected with malware. This allows them to be remotely controlled. These infected devices are called “bots” and a group of them is called a “botnet”.


Once a botnet has been established, attackers can direct an attack by sending remote instructions to each one of them.


When a victim’s server or network is targeted, each bot sends a request to the target IP address. This causes the target network to become overwhelmed resulting in a denial-of-service to the already existing traffic.


Identifying a DDoS attack


When you see your website or some service suddenly become slow or unavailable, it is an obvious sign that a DDoS attack has happened. However, other reasons such as a legitimate spike in traffic can also create similar performance issues, making identification of the true reason difficult. But, Traffic Analytics Tools can help you spot some telltale signs of DDoS attacks:


Suspicious traffic originating from a single IP address or IP range.


A flood of traffic from computers who share a single behavioral profile like IP address, location, web browser version.


A sudden surge in requests to a single page.


There are other signs as well which may vary as per the type of attack.


Types of DDoS attacks


DDoS attacks can vary as per network connection. Therefore to understand what kind of DDoS attack has taken place, it is important to understand the order in which a network connection is built.


A network is composed of several layers of different components. The OSI(Open Systems Interconnection) model below explains a framework used to describe network connectivity:


What is a DDoS attack melbourne cybersecurity consultant your it and tech mates

Thank you, Quora and TTB.


All in all, DDoS attacks can be classified into three major categories:


●  Application Layer Attacks

●  Protocol Attacks

●  Volumetric Attacks


Mitigating DDoS Attacks


When you can differentiate between attack traffic and network traffic, you can focus on adopting ways to alleviate the attacks.


DDoS traffic may arrive in several forms. A multi-vector DDoS attack uses multiple pathways to overwhelm a target thus distracting your mitigation efforts. Moreover, mitigating an attack that targets multiple layers of the protocol stack at the same time requires a variety of strategies to counter different trajectories.


Strategies such as Blackhole routing, Rate Limiting, Web App Firewalls, and Anycast Network Diffusion can help effectively mitigate issues that arise due to DDoS attacks.


If you are under attack at the moment, there is certainly one of these ways we can help you ease up the pressure. Reach out to the team at TTB to know the ways we can help you.

What is a DDoS attack

Your IT and Tech Mates protect your sensitive information, organizations, and critical IT systems from cybercrime and data breaches. Book a free cyber security audit now on Call Now or Book Now.



Reference: TTB Total Security ( TTB Total Security is a leading cybersecurity company, we believe in providing advanced security solutions to our customers. ) – “What is a DDoS attack?”  originally appeared on Quora, the place to gain and share knowledge, empowering people to learn from others and better understand the world.



Your it and tech teach mates Melbourne it support Melbourne computer repairs phone repairs

More than just IT, we're your trusted security advisors: Let Your IT and Tech Mates be your data saviors.