There has been a significant spike in DDoS attacks this year, according to research by cybersecurity firm Kaspersky Lab.
There has been an 84% increase in SYN flooding in the first quarter of 2019 compared with the fourth quarter of 2018. This number is set to be overtaken as attacks will increase with 5G becoming more common and as attackers increase the availability of weaponry in the DDoS arsenal.
It appears that new DDoS attack methods have replaced those that have been shut down by law enforcement agencies. Companies implement basic countermeasures and attackers retaliate by deploying long-lasting attacks. It is difficult at this point to predict the rate at which the attacks will continue to grow, but what is certain is that the complexity of DDoS attacks is showing no signs of slowing down. We highly recommend that companies adequately prepare themselves.
What is a DDoS attack?
When a distributed denial of service (DDoS) attack is deployed, an attacker tries to make it difficult for a service to be delivered. This is achieved by blocking access to virtually anything from servers, devices, services and networks to applications. To put it into perspective, a DoS attack is when one system sends out malicious requests, while a DDoS attack is sent from multiple systems.
The attacks work to swamp the system with requests for data – either by sending a web server so many requests to a page that it crashes under the demand or by targeting a database with a high volume of queries. This then overwhelms your bandwidth, CPU and RAM capacity. The impact of the attack could range from a minor annoyance to disrupting your services or even taking your entire business offline.
What’s your best defence?
You should have the most sophisticated DDoS security solutions in place, but you shouldn’t stop there. The reality is that you can still be hit by a security breach. The trick is to know how to recover when things go wrong and for your business to remain operational even after a DDoS attack.
Our solution, DDoS Protection and Mitigation , takes a proactive approach to DDoS defences.
This service instantly analyses the type and scale of the attack and quickly redirects network traffic through our scrubbing centre, which puts you in a strong position to combat these large-scale attacks.
If the attack is successful, the service will give you different options for managing traffic under a threat so you can manage the risk of network downtime. By being able to redirect traffic when the network is under threat, you can safely continue operations and will not be at risk of a total shutdown.
Cloud Blackhole Mitigation: Sends the host server requests to a black hole.
Cloud Scrubbing Mitigation: Scrubs all traffic so only clean traffic gets through.
Hybrid Cloud Mitigation: Automatically detects application, TCP-state and volumetric attacks, and combines a cloud-based scrubbing service with an on-site CPE solution.
Find out exactly how vulnerable your business is by reading our Enterprise-level security risk assessment e-book.
Read more blogs below