top of page

DDoS Attacks and Vulnerability Assessment

 

The DDoS or the distributed denial of services attacks is an attempt to make internet services unavailable by making the overwhelming the server with multiple high traffic from multiple sources. They are directed to important resources such as news websites, banks, and as such. They are a major challenge to publishing and accessing important information. The DDoS are available in markets, and some can cost as little as $150 on the black market. There are more than 2000 daily DDoS attacks according to the Arbor Networks. It has been observed that a third of all the downtimes are caused by DDoS attacks.

 

The attackers build networks of infected computers referred to as botnets. They spread malicious software through emails. Social media and websites. Once they infect the machines, the machines are controlled from a remote place without the knowledge of the user. They are then used as an army to launch attacks against a target. Some botnets can be as powerful as millions of machines.  They then generate high traffic to the target and overwhelm it. The generated requests are more than the server can handle or the victim receives high amounts of data to exhaust the allowed bandwidth. There can be large attackers that can run out a country's international cable capacity. For more information, you may also check http://edition.cnn.com/2014/12/19/politics/government-hacks-and-security-breaches-skyrocket/.

 

There are some online marketplaces at this link where botnets are sold. They also offer the individual DDoS attack services.  One can, therefore, approach these sites to silence websites. They disagree or disrupt the organization's online operations. The DDoS attacks are not expensive as an attack that can disrupt the operation of a small organization for a week can cost as little as $150.

 

It is possible to explore the operation of the distributed denial of services attacks on a global level. The attacks are displayed as dotted lines, placed according to the source and destination courtiers and scaled to size. Some of the features of data analytics for the DDoS include the use of the histogram to explore historical data.  You can select a country to view the DDoS attacks from the country. The color options give you the chance to view attacks by class, duration, and source and destination port.  The news section gives you reports on the online reports of the attack activity over a period.  You can view the gallery and check the DDoS attacks in specific days.  The attacks can be in the form of Smurfs, Teardrops, and pings of death attacks, click here to get started

bottom of page