Learn more about distributed denial of service (DDoS) attacks, including the different attack types and tips for preventing them.
Distributed denial of service (DDoS) attacks is a cyber threat that overwhelms an online resource with traffic, causing the web service to fail to operate normally and possibly even go offline. This threat is capable of doing significant harm to a business, prevent users from gaining access to sites, or significantly slows down the web server to the point it becomes inaccessible.
Attacks can last for several hours, and in severe cases, prevail for multiple days. Many businesses and organizations rely heavily on their online platforms so a DDoS attack can come with significant consequences.
Attackers may strategically time DDoS attacks during critical time periods. For example, an online retailer could suffer an attack on a high-volume shopping day such as Black Friday, where its website becomes inaccessible, causing them to lose a considerable amount of business. In some cases, it's attackers may infiltrate databases during DDoS attacks and gain access to sensitive information due to security vulnerabilities being exploited.
Read more: Cybersecurity Terms: A to Z Glossary
Preventing and identifying DDoS attacks can come with challenges since it may be difficult to differentiate genuine traffic from attack traffic. One strategy for preventing DDoS attacks is rate limiting. Rate limiting puts a limit on the number of requests a server will accept over a given period of time. Web application firewalls (WAF) are especially useful in preventing application layer attacks by protecting the server from illegitimate traffic.
Here are the three main types of DDoS attacks:
Application layer attacks: This attack aims for the software that provides the web service. It typically exhausts the target’s resources making this type of DDoS attack challenging to defend against.
Protocol attacks: Protocol attacks, also known as state-exhaustion attacks, target firewalls or the device's operating system. This consumes the resources of these network-based devices and servers, causing the inaccessibility of web services.
Volumetric attacks: Volumetric attacks use extreme amounts of traffic to congest the target. This overwhelming flood of traffic consumes all of the available bandwidth, and services become unavailable as a result.
Operating system
Physical security
If you’re ready to get started in a cybersecurity career, consider enrolling in the Google Cybersecurity Professional Certificate on Coursera. Learn how to use job essential tools like Splunk, Chronicle, playbook, and more. This program is designed to help individuals with no previous experience find their first job in the cybersecurity field, all at their own pace.
[entity card: Google Cybersecurity Professional Certificate]
Editorial Team
Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...
This content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.