Understanding And Mitigating DDoS Network Attacks

Understanding And Mitigating DDoS Network Attacks

What is a DDoS Attack?

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

DDoS attacks achieve effectiveness by utilizing multiple compromised systems as sources of attack traffic. Exploited devices can include computers, mobile devices and Internet of Things (IoT) devices such as webcams, routers, DVRs and more.

These exploited devices are often referred to as a botnet – a number of Internet-connected devices communicating with other similar devices in order to perform tasks.

In a DDoS scenario, the botnet is controlled by a botmaster who issues attack commands from a remote location. When a target is designated, all infected devices will begin to send data packets to the target in hopes of overwhelming its capability to process requests and render it inaccessible.

Common DDoS Attack Types and Vectors

There are several common DDoS attack types and vectors:

Volume-Based Attacks

These attempts aim to saturate the bandwidth of the targeted site, server or network. Large scale volumetric floods can generate over 100Gbps of malicious traffic.

  • UDP floods – Leverage UDP protocols for overwhelming amounts of traffic
  • ICMP floods – Leverage ICMP protocols with overwhelming pings
  • DNS amplification attacks – Exploit misconfigured DNS servers into amplifying traffic

Protocol Attacks

These attacks send seemingly legitimate packets, but manipulate protocols in specific ways to consume server resources.

  • SYN flood attacks – Send succession TCP SYN packets to consume resources
  • ACK flood attacks – Manipulate packet acknowledgements

Layer 7 Attacks

These target application layer weaknesses and vulnerabilities versus lower level network layers.

  • HTTP flood attacks – Overwhelm web servers with valid HTTP requests
  • Slowloris – Slowly send partial HTTP requests to tie up connections
  • GET/POST floods – Abuse HTTP GET and POST functions with overwhelming traffic

Multi-Vector Attacks

These combine multiple DDoS vectors for increased effect. For example, a UDP flood could be combined with a HTTP flood attack.

DDoS Mitigation Strategies

There are technical and organizational strategies that can be followed to improve mitigation and defense against DDoS attacks:

Use a Web Application Firewall (WAF)

A WAF provides deep inspection capabilities above standard firewalls and can detect and filter out malicious traffic. WAF rules can assist in blocking common DDoS vectors.

Enable Rate Limiting

Enable rate limiting on connections, requests and packet flow. This can help prevent flooding from any single source.

Null Route Identified Attack Sources

When an attack is occurring, offending source IP addresses can be null routed or blackholed to temporarily block them.

Use a Reputable DDoS Mitigation Service

A dedicated DDoS mitigation service can scrub incoming traffic at their data centers before it reaches your network perimeter. These services offer DDoS-specific protection.

Maintain Extra Bandwidth

Having additional bandwidth from ISPs provides capacity to absorb DDoS traffic trying to saturate your connection.

Update Server Configurations

Ensure servers have the latest security updates installed. Disable unused services and ports to reduce possible attack surface.

Enable IP Blocking Features

Enable advanced IP blocking solutions that prevent traffic from unauthorized sources from reaching key servers.

Develop an Incident Response Plan

Have a plan in place to identify, isolate and mitigate DDoS attacks. Include communication protocols to involve leadership, IT teams, and your ISP.

Conclusion

DDoS attacks aim to negatively impact business operations by denying access to key infrastructure and services. However, with multilayered security controls, updated configurations, and advanced mitigation techniques in place, the risk of attack impact can be greatly reduced. Continuous awareness and proactive planning are key factors in limiting disruptions from DDoS attacks.

Facebook
Pinterest
Twitter
LinkedIn