You have probably heard about DDoS attacks, but not too many people can explain what this is. This growing concern affects a lot of businesses and non-profit organizations of all sizes every day.
DDoS is an acronym that stands for “Distributed Denial of Service”. The aim of DDoS is to make some web resource unavailable to its users by bombarding it with malicious traffic from many computers around the world.
Unlike DoS attack, where only one computer is used, DDoS attacks can use thousands or even hundreds of thousands of computers. These computers are infected by computer Trojan viruses called “bots”; and their network is named “botnet”.
You may not even know that your personal computer is infected by a virus. Bots can infect your PC in many different ways; they search for unprotected computers and hide there until they receive instructions to become a part of a botnet for some malicious actions.
Having received this instruction, the computer starts sending packets to a web host that is being attacked. As a result, target web server overloads and shuts down, being unable to process such a huge amount of traffic.
Types of DDos Attacks
There are 12 types of DDoS, but all of them can be separated into 3 main groups:
1) Protocol Attacks. This type of DDoS uses up actual web server, load balancers or firewall resources. Magnitude of this group is measured in Packets per second.
2) Volume Based Attacks. The goal of this type of attack is to overwhelm the bandwidth of the targeted website. Magnitude of it is measured in bits per second.
3) Application Layer Attacks. Consist of seemingly innocent and legitimate requests; the purpose of these attacks is to crash the web server. Magnitude of this type is measured in Requests per second.
All of them have the same goal: crashing web server to suspend the service. Sometimes hackers do it just for fun or money. In other cases different web sites are attacked in revenge for some actions that caused discontent of people.
In any way, distributed denial of service attack is illegal, but it is very hard to find responsible person because botnets consist of thousands of computers all over the globe. Most of their owners do not even realize they are being part of some illegal activities.
Unfortunately, nobody can guarantee you 100% protection against cyber-attacks. Even huge organizations, that operate billions of dollars, can become victims of hacker groups. The more computers are in the botnet, the stronger the attack is. If a botnet numbers hundreds of thousands of infected computers, the attack by this botnet can crash any server.
As for weak DDoS actions, they can be easily handled by a professional technical team. Here is what we do for our customers’ protection against DDoS:
- Our qualified technical support team is constantly monitoring server load and takes measures immediately in case of any overload. All suspicious IP addresses that try to deluge our servers with junk data are being blocked and blacklisted.
- Our servers, which are located in GNAX datacenter in Atlanta, have DDoS protection on hardware level. This gives our customers extra protection, no matter what type of hosting plan they choose.
- There is a possibility to order Dedicated IP add-on to any of our hosting plans. Even if server crashes, websites that have dedicated IPs will become live faster than those without this extra feature.
Risk of being attacked can be reduced, but there is no way to receive full protection. Only big corporations can afford special firewalls and other security measures, and even this does not give enough security level. If you have small, non-commercial website, the chance to become a hackers’ prey is extremely low. Even if this happens, our technical team is always ready to help you.
- How to Transfer a Domain Name to Another Registrar
- What is Hosting? Why do I need it?