A Denial of Service (DoS) attack and a Distributed Denial of Service (DDoS) attack are cyberattacks that attempt to disrupt or shut down a targeted server, network, or website by inundating it with a large amount of traffic or requests, making it inaccessible to legitimate users.
Both Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can inflict considerable harm on businesses and organizations. They can result in revenue loss, reputation damage, and even legal repercussions. To prevent these attacks, organizations typically utilize security measures like firewalls, intrusion detection systems, and traffic filtering.
A Denial of Service (DoS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of internet traffic. This attack aims to render the website or service unavailable to its intended users by exhausting the target's resources. Unlike other cyber threats that seek unauthorized access to data, the primary objective of a DoS attack is to impede the accessibility of online services, causing inconvenience and potential financial losses to businesses and users alike.
In a DoS attack, a single attacker or system sends a large number of requests or data packets to the target server, network, or website, overwhelming its resources and causing it to crash or become unresponsive. This can be done using various methods, such as flooding the target with traffic, exploiting vulnerabilities, or sending malformed packets.
A Distributed Denial of Service (DDoS) attack is a more advanced and coordinated form of a DoS attack. Instead of using a single system, the attacker uses multiple compromised systems (often referred to as a botnet) to launch simultaneous attacks on the target. This distributed nature of the attack makes it more challenging to trace the source and defend against it, as the traffic comes from many different sources.
DDoS attacks can be segregated by which layer of the Open Systems Interconnection (OSI) model they attack. They are most common in the Network (layer 3), Transport (Layer 4), Presentation (Layer 6) and Application (Layer 7) Layers.
The working principle of a DDoS attack involves using a large number of legitimate or forged requests to occupy the resources of the target server, making it unavailable to legitimate users.
Here's a breakdown of how DDoS attacks work:
When analyzing and classifying attack methods, we categorize the attacks into the infrastructure layer (Layer 3 and Layer 4) and the application layer (Layer 6 and Layer 7). Attacks on Layer 3 and Layer 4 are typically classified as infrastructure layer attacks, which are also the most common types of DDoS attacks. Attacks on Layer 6 and Layer 7 are usually classified as application layer attacks. While these are less common, they tend to be more complex. Compared to infrastructure layer attacks, these attacks are usually smaller in volume.
Based on common attack scenarios, the attack types are categorized as follows:
These attacks target network layer or transport layer protocols, primarily focusing on the 3rd and 4th layers. These are the most common types of DDoS attacks, including Synchronous (SYN) flood attacks and other reflection attacks such as User Datagram Protocol (UDP) flood vectors. These attacks are usually large in number, aiming to overload the capacity of the network or application server. However, these attacks are also the types with clear identifiers and are easier to detect.
This type of attack is like the staff in the supply room receiving requests from the store counter. The staff receives the request, goes to fetch the package, waits for confirmation, and then delivers the package to the counter. The staff receives too many package requests but gets no confirmation, until they can't handle more packages, and are overwhelmed, resulting in no one being able to respond to the requests.
These attacks involve exploiting the TCP handshake, which is a series of communications that two computers go through when initiating a network connection. The attacker sends a large number of TCP initial connection request - SYN packets with spoofed source IP addresses to the target. The target computer responds to each connection request and then waits for the last step in the handshake, but this step never happens, thus exhausting the target's resources. As a result, the attacks consume the resources of servers or network devices such as load balancers and firewalls.
These attacks focus on specific applications or services, mainly targeting the 6th and 7th layers. They are complex attacks that often resemble normal user traffic. Examples include HTTP floods, slow attacks like Slowloris, and DNS query floods. Although less common, these attacks are often more intricate. In comparison to infrastructure layer attacks, they usually involve fewer instances but pinpoint specific critical areas of the application, rendering it inaccessible to genuine users.
Examples of such attacks involve a high volume of HTTP requests on the login page, resource-intensive search APIs, or Wordpress XML-RPC flooding (also known as Wordpress pingback attacks). It's akin to repeatedly hitting refresh in numerous web browsers, causing a flood of HTTP requests overwhelming the server and resulting in a denial of service. These attacks can be simple or complex. Simple implementations might involve using the same set of attacking IP addresses, referrers, and user agents to access a URL. In contrast, more complex versions may use numerous aggressive IP addresses and employ random referrers and user agents to target random URLs.
These are the most common types of DDoS attacks, aiming to saturate network bandwidth. The attacker needs to control a large number of 'botnets' to generate enough traffic, trying to create and send a large amount of traffic to make network services unavailable. Examples include UDP floods, ICMP floods, and other indiscriminate amplified traffic attacks. Specific types include:
Attackers exploit third-party servers to amplify attack traffic. For example, NTP amplification, DNS amplification, and SNMP reflection attacks. These attacks forge the victim's IP address, directing the response of the reflection server towards the victim, thereby amplifying the attack traffic. It's like someone calling a restaurant and saying, 'Order one of each dish and call me back to repeat the entire order,' but the callback number belongs to the victim. With little effort, a lengthy response can be generated and sent to the victim. After sending a request to an open DNS server using a forged IP address (the victim's IP address), the target IP address will receive the server's response.
These attacks combine several of the above methods, attacking the target in multiple ways simultaneously. They are harder to defend against because they require dealing with multiple attack surfaces at once.
If a DDoS attack causes business interruption or damage, it will bring huge commercial losses.
Tencent EdgeOne offers robust DDoS protection, leveraging Tencent's extensive global network and advanced security technologies. Key features include:
By using Tencent EdgeOne DDos Protection, businesses can ensure the availability and performance of their online services, even in the face of large-scale DDoS attacks. We have now launched a free trial, welcome to contact us for more information.