Wednesday, June 29, 2022
Techiexpert.com
No Result
View All Result
  • Login
  • Register
Exclusive Videos
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
No Result
View All Result
TechiExpert
No Result
View All Result

DDoSers Shift to Smaller Attacks

Sony T by Sony T
November 10, 2021
in Tech news
Reading Time: 4 mins read
CyberSecurity
10
SHARES
142
VIEWS
Share on FacebookShare on Twitter

If you’re not familiar with a DDoS (Distributed Denial of Service) attack, consider yourself among the lucky ones. An increasingly common form of cyber attack that has brought down the websites and online services of some of the biggest companies in the world, DDoS attacks work by bombarding targets with enormous amounts of fraudulent traffic. Like directing large quantities of real world traffic down a street too narrow to handle it, the result is a gridlock that stops legitimate traffic from reaching its target.

For those without the right DDoS protection services, the results can be disastrous.

DDoS attacks have been a fixture of cyber attacks throughout the twenty-first century thus far. However, recently there has been a shift to smaller attacks, referred to as a bit-and-piece DDoS attack.

Smaller isn’t better

Unfortunately, if a smaller attack sounds less serious, think again! Low-bandwidth distributed DDoS attacks are typically smaller in size, measuring in at less than 1 Gbps (gigabyte per second). They work by drip-feeding junk traffic into a big IP pool, making it tough on targets by clogging them up with, literally, bits and pieces of traffic from various different IPs. In essence, they spread their junk traffic out across huge numbers of IP addresses, injecting small quantities of junk into the genuine traffic that flows from these IPs.

Despite their relatively smaller size, they are still sufficient to bring down services and websites targeted using the strategy of high packet-rate loads consisting of smaller volumes of traffic. While not measuring up to the biggest DDoS attacks — which can tip the scale at upward of 2 Gbps — bit-and-piece DDoS attacks are able to evade many DDoS mitigation systems for detecting such attacks. Because there is so little junk traffic per address, they are not detected — like counterfeit or other illicit goods being smuggled as part of a larger genuine shipment.

This poses a massive risk for targets, since it means many of their existing measures, if they have not taken the necessary precautions, may not be up to the job. Even very small attacks, such as in the vicinity of tens of megabytes per second, can have an impact by being used for continued, sustained attacks.

Attacks increase

News about this next generation of DDoS attacks comes from a recent report claiming that low-bandwidth distributed DDoS attacks ramped up by a massive 233 percent during the first half of 2021. Virtually all of these attacks were under 1 Gbps — and many much smaller than that. Due to the unique attack profile, these bit-and-piece attacks are able to evade signature and threshold-based DDoS detection systems.

DDoS attacks have only become more commonplace and popular (with attackers, not victims) during the pandemic. As the world has relied more than ever on the connected infrastructure provided by the internet — for everything from remote work to entertainment to retail — efforts by bad actors to try and bring down these internet services have increased significantly. The impact of a DDoS attack on a company can range from lost earnings (during the outage itself) to longer term reputational damage.

DDoS attacks are not going to go away any time soon. As demonstrated by the rise of bit-and-piece attacks, they continue to evolve in ways that allow attackers to slip under the radar and execute successful attacks. The rise of DDoS-for-hire services — which allow would-be attackers to hire a botnet for executing an attack, the way users might hire a movie on Apple’s TV app — simply adds to the problem. Such attacks can be rented for as little as a few dollars at a time, lowering the barrier to entry.

Use the best tools available

It’s for this reason that it’s crucial that organizations deploy the best, and most robust, DDoS tools that are available to offer protection. Traditional measures that might have safeguarded against threats just a few years ago can no longer be relied upon to work in every context. DDoSers are now using new tactics to evade legacy anti-DDoS solutions. Fortunately, there are tools that can help.

Anti-DDoS tools are able to use various intelligent means to monitor for fraudulent traffic, even when it might be obscured. By doing this, it’s possible to identify impending DDoS attacks and block them, all the while continuing to let genuine traffic through to its destination. There are also services referred to as DDoS deflation which are able to help absorb DDoS attacks of different sizes, without them having the detrimental impact they seek.

DDoS attacks can cover a wide range of approaches, all with the same ultimate goal. However, by availing yourself of the right protective measures, it’s possible to safeguard against all of them. It’s something that’s likely to earn you the gratitude of your customers — and anyone else who relies on what it is that you have to offer.

Tags: DDos
Share4Tweet3Share1Pin1

Related Posts

Ways Data Analysis has changed customer reward programs
Tech news

Ways Data Analysis has changed customer reward programs

Digital Learning face recognition
Tech news

Here’s why Deep Learning might not be enough for celebrity face recognition

VPS Helps Forex Trading
Tech news

Staying Safe When Trading on a Trading App

Mozilla launches Thinderbird for android
Tech news

Mozilla launches Thinderbird for android

Is Signal an alternative to Whatsapp?
Tech news

Is Signal an alternative to Whatsapp?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Most Read

  • How to Track Someone’s iPhone by Phone Number?

    How to Track Someone’s iPhone by Phone Number?

    286 shares
    Share 114 Tweet 72
  • Top 5 car automation trends to know

    122 shares
    Share 49 Tweet 31
  • What is windows modules installer ? How to Enable/Disable

    1231 shares
    Share 492 Tweet 308
  • Is Parody Coin investment a Good Investment?

    55 shares
    Share 22 Tweet 14
  • How to Track Activities an Instagram account?

    79 shares
    Share 32 Tweet 20
  • Tips to Reduce Your Website Hosting Costs

    868 shares
    Share 347 Tweet 217

Recent Stories

How Enterprise Blockchain can enable Privacy Preservation

How Enterprise Blockchain can enable Privacy Preservation
Share4Tweet3Share1Pin1

How to flip NFT’s

How to flip NFTs
Share4Tweet3Share1Pin1

Data Analytics startup USEReady launches a new centres

Data Analytics startup USEReady launches a new centres
Share5Tweet3Share1Pin2

What are the Advantages of an Electric Mountain Bike?

Releasing prototypes create waves in the electric bike industry
Share7Tweet5Share1Pin3
  • Terms of use
  • Privacy Policy
  • About Us
  • Contact us
  • Write For Us
  • Cookie Policy

© 2022 All Rights Reserved

No Result
View All Result
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media

© 2022 All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Cookie Law Notice
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT