What is a Distributed Denial of Service (DDoS) Attack?

DDoS attack diagram

A Distributed Denial of Service attack occurs when a malicious entity sends more traffic to your network than it can handle in order to overload it. When this occurs, your network equipment can become overloaded and fail into a state known as “hub mode” in an effort to maintain communication across the network. When this “hub mode” is enabled, all of the traffic on your network is blasted to every port, allowing an attacker to gather meta and packet data in an effort to map topology of your equipment.

Having a map of your network makes it easier for attackers to push forward with deeper penetration into your infrastructure, allowing them to breach data systems and steal information about your business and clients. The reasoning behind DDoS attacks can vary from revenge to anti-competitive businesses. Whatever the intent behind the cyber-attack is, the goal is to be a huge headache for that organization by bringing down their network.

To learn more information about ICN’s DDoS Mitigation service visit: https://icn.iowa.gov/services/ddos.

Related Articles:

Any online business a target of DDoS attacks

http://www.computerweekly.com/news/450429474/Any-online-business-a-target-of-DDoS-attacks

Blockchain startup: 300,000 DDoS attacks will cause $150B in damages this year
https://www.csoonline.com/article/3234775/security/blockchain-startup-300000-ddos-attacks-will-cause-150b-in-damages-this-year.html

Risk & Repeat: DNS DDoS attacks raise concerns over IoT devices
http://searchsecurity.techtarget.com/podcast/Risk-Repeat-DNS-DDoS-attacks-raise-concerns-over-IoT-devices