From the one or 2 years, the threat of DDoS has come into life. DDoS means distributed denial of service. Through DDoS attack, the attacker makes the internet resources of the victim unavailable. The attacker takes advantage of the Uof the victim, and they can attack the one machine that is connected to the internet. The attacker of the victim should know UDP and TCP IDs. When DDoS is carried out, it attacks multiple computers and compromises them by flooding victim’s network such that the server of the victim cannot handle. In a DDoS attack, there are three parties involved: one is the offender, second is the helper/helpers, and the third is the victim. The offender is who plans the attack, the helpers are the compromised machines, and the victim is the person whose network is compromised.
Five factors which motivate DDoS attacks are as follows:
- Booter Services
In which, the main motivations are hacktivism and vandalism.
Mitigation of DDoS attacks
Mitigation can be prevented by determining four stages:
- Detection: When your traffic flow deviates, it might be a signal that DDoS assault is building up against you. So, the effectiveness in which you can know or recognize the attack the earliest possible will measure the ability to mitigate it. The more instantaneously you know it, you can mitigate is earlier.
- Diversion: When traffics are rerouted from the target, either it should be filtered or discarded completely.
- Filtering: DDoS traffic can be neglected by identifying the patterns instantly by distinguishing legitimate traffic, for example, humans, calls by API, and bots of search engines. Your responsiveness should be able to block the attack but not interfere with the user’s experience. You should be transparent to the visitors of the site.
- Analysis: Security logs are created, and they should be viewed to get information about an attack, firstly to identify the offender/offenders and creating more resilience for the future.
For more information, you can visit http://www.roninpbr.com/ddos-perspectives-a-network-operators-point-of-view/.