Stop DDoS Attacks

Stop DDoS and hacker attacks.jpg

Two things keeping business owners up at night : Their competition and hackers

Tactically, addressing competition is much easier. Hackers, however, are like sharks in the water. From the surface they aren't visible, but you know they're there, waiting for their opportunity to strike.

What is a DDoS attack?

A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a service to be delivered. This can be achieved by thwarting access to virtually anything: servers, devices, services, networks, applications, and even specific transactions within applications. In a DoS attack, it's one system that is sending the malicious data or requests; a DDoS attack comes from multiple systems.

Generally, these attacks work by drowning a system with requests for data. This could be sending a web server so many requests to serve a page that it crashes under the demand, or it could be a database being hit with a high volume of queries. The result is available internet bandwidth, CPU, and RAM capacity becomes overwhelmed.

There are three primary classes of DDoS attacks:

  1. Volume-based attacks use massive amounts of bogus traffic to overwhelm a resource such as a website or a server. They include ICMP, UDP, and spoofed-packet flood attacks. The size of a volume-based attack is measured in bits per second (bps).

  2. Protocol or network-layer DDoS attacks send large numbers of packets to targeted network infrastructures and infrastructure management tools. These protocol attacks include SYN floods and Smurf DDoS, among others, and their size is measured in packets per second (PPS).

  3. Application-layer attacks are conducted by flooding applications with maliciously crafted requests. The size of application-layer attacks is measured in requests per second (RPS).

For each type of attack, the goal is always the same: Make online resources sluggish or completely unresponsive.

New technology now analyzes both inbound AND outbound traffic and can easily be layered over your existing network.

If you aren't willing to be the victim of an attack and would like more information, we can set up an in-depth call to discuss your security. 

Contact us today to take a 13 question Cybersecurity Test to determine your risks.

Previous
Previous

What is Unified Communications and Collaboration (UC&C)

Next
Next

Nextiva Offers HIPAA-Compliant Voice, Fax and Video