How to prevent DDoS attacks: tips from security experts
انتشار: خرداد 07، 1403
بروزرسانی: 27 خرداد 1404

How to prevent DDoS attacks: tips from security experts


Distributed Denial-of-Service (DDoS) attacks are one of a website’s most challenging threats. The number of DDoS attacks continues to rise every year.

The Q4 2023 DDoS threat report by Cloudflare\xa0says that the company noticed a 117% year-over-year increase in network-layer DDoS attacks and overall increased DDoS activity targeting retail, shipment, and public relations websites during and around Black Friday and the holiday season.

This shows that the number of DDoS attacks is growing as they are used against businesses and governmental institutions to wage cyber attacks. For example, Cloudflare reported\xa0an increase in DDoS attacks following the start of the Israel-Hamas war.

How DDoS attacks work

DDoS attacks can strike at any time and aim to overwhelm a server, service, or network with excessive Internet traffic, disrupting normal operations.

DDoS attackers often use botnets — compromised computer networks, known as “zombies” or “bots.” These bots are typically infected with malware and controlled remotely by the attacker.

When the attacker initiates a DDoS attack, they command all the bots in the botnet to send a massive volume of requests to the target server or network. This overwhelming influx of traffic exceeds the server’s capacity to handle legitimate requests, causing a slowdown or complete outage.

There are three types of DDoS attacks:

  1. Volume-based attacks\xa0— These are the most common types of DDoS attacks. They aim to saturate the bandwidth of the targeted site or network. Techniques include UDP floods, ICMP floods, and other spoofed-packet floods.
  2. Protocol attacks\xa0—These attacks consume server resources or intermediate communication equipment like firewalls and load balancers. Examples include SYN (synchronize) message floods, fragmented packet attacks, and the oversized packets used in ping-of-death attacks.
  3. Application layer attacks\xa0—\xa0These are the most sophisticated and stealthy DDoS attacks, targeting specific applications or services. They generate legitimate-looking requests but in large volumes, making distinguishing between legitimate traffic and attack traffic hard. Examples include HTTP floods and Slowloris attacks, which can be effective at lower request volumes than standard HTTP floods by keeping server connections open.