Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
8/10/2023 | 4 Minute Read
Topics:
A distributed denial of service (DDoS) attack is a malicious hacking method that uses multiple compromised devices to make an online service unavailable by temporarily interrupting, crashing, or corrupting the services of its hosting server.
Most DDoS attacks aren’t leveraged to gain access to sensitive information or files—they usually serve as a distraction, opening new doors for threat actors to infiltrate companies. As different methods of DDoS attacks continue to rise, there are three core types of DDoS attacks to stay aware of: Volume-based, protocol-based, and application-based attacks.
Your team needs to be ready to have a protection plan for all types of DDoS attacks. Read on to discover the differences between types of DDoS attacks as well as preventive cybersecurity measures you can implement.
DDoS attacks are quickly becoming the most prevalent type of cyber threat: From early 2020 to 2021, there was a 341% increase in DDoS attacks.
DDoS attack methods can cause significant network damage and result in substantial financial loss for organizations worldwide, as well as additional consequences, such as:
There are three core DDoS attack types that impact organizations: Volumetric, protocol, and application.
To gain a deeper understanding of DDoS attack methods, it’s important not to conflate these with other threats, such as phishing, malware, or other threats. DDoS attacks serve as their own prominent form of threat, often paving the way to additional infiltration or even ransomware demands.
The volume-based DDoS attack method is designed to disrupt normal traffic or requests by overwhelming the target with a flood of fraudulent traffic from numerous sources. This then results in a complete shutdown or compromised service, even for legitimate users.
Many types of volumetric DDoS attacks are launched using IoT botnets—or groups of bots built from IoT devices, such as IP cameras or consumer routers. Some of the most notable versions of DDoS attacks include:
UDP flood - A UDP flood attack floods a target with User Datagram Protocol (UDP) packets, rendering it unable to establish a two-way session with a server. UDP flood attacks target a specific or random server within a network by including the IP address in the attacking packets to exhaust all bandwidth capabilities.
ICMP (ping) flood - Similar to a UDP flood attack, an ICMP (ping) flood attack overwhelms and exhausts bandwidth capabilities by sending rapid packs without waiting for replies. A victim’s server will attempt to respond with ICMP Echo Reply packets that result in a significant system slowdown.
Connection exhaustion - Also known as state-exhaustion attacks, Connection exhaustion attacks target infrastructure (like web application servers) to completely overwhelm connection tables with fake data.
One of the most recent volumetric DDoS attacks occurred in 2020 and hit AWS. The attack leveraged CLDAP to flood AWS with unwanted traffic, and it required the AWS Shield team a few days to successfully secure the servers.
Another popular type of DDoS attack is the protocol-based attack. This DDoS attack method relies on weaknesses within internet communication protocols to exploit organizational vulnerabilities. Protocols such as HTTP (Hypertext Transfer Protocol), DNS (Domain Name System), or SIp (Session Initiation Protocol) can be used to launch protocol-based DDoS attacks.
Protocol-based DDoS attack types typically work by a hacker exploiting vulnerabilities within the protocol implementation to fully consume the target’s resources—and disrupt its normal operations. This may involve flooding the target with an excessive amount of protocol-specific results. Malicious actors typically deploy a botnet to achieve protocol-based DDoS attacks.
Some common methods include:
The first known DDoS protocol-based attack occurred in 1996 when New York City internet provider, Panix, experienced a SYN flood attack. The attack shut down its servers and took more than 36 hours to regain control over the Panix servers and domains.
One of the most prominent examples of a successful protocol DDoS type of attack occurred in 2018. Hackers used Border Gateway Protocol (BGP) hijacking to redirect traffic destined for an organization called MyEtherWallet to Russian servers, which provided a fake version of the site.
The attack lasted for two hours and resulted in malicious actors stealing the contents of cryptocurrency wallets.
The third type of DDoS attack is known as the application-based attack. Also known as Layer 7 DDoS attack, this method targets the application layer of the network stack—which is the layer responsible for processing specific protocols, such as HTTP, SMTP (Simple Mail Transfer Protocol), or DNS.
Unlike traditional volume-based DDoS attacks, the application-layer attack focuses on exploiting any vulnerabilities within the application itself. By targeting these vulnerabilities, the hacker can exhaust server resources—such as CPU, memory, or application processes.
In 2018, GitHub, the popular code hosting platform, experienced a massive application-layer DDoS attack. The attack exploited the Memcached servers, which were used as amplifiers, and hackers sent spoofed requests to flood GitHub’s infrastructure. The attack was one of the largest DDoS attacks in history at the time.
Now that you understand the various types of DDoS attacks, it’s time to unpack several cybersecurity solutions to help prevent and protect against these attacks.
Consider implementing the following to help prevent a DDoS attack:
In addition to the preventive measures outlined above, you should also create a DDoS attack response plan, as even the best proactive measures can succumb to a threat.
To protect your clients’ organizations against the wide plethora of different types of DDoS attacks, MSPs must deploy a nuanced defense strategy. Follow these best practices for mitigating DDoS attacks:
Understanding the different types of DDoS attacks help to prevent, protect, respond to, and recover from them. Given the rise in DDoS attacks and the devastating consequences to organizations, no matter the size, it’s important to implement mitigation tactics today.
The ConnectWise Cybersecurity Suite was designed to provide MSPs with the optimal security protection and support clients demand, from advanced threat detection to a fully staffed SOC. Watch an on-demand demo today to learn more about our best-in-class cybersecurity software and solutions.
The three types of DDoS attacks are: volumetric, protocol, and application attacks.
Protecting your website against different methods of DDoS means implementing a multi-layered defense strategy to handle fake traffic sent by malicious actors that could overwhelm your server. Consider the following to mitigate DDoS attacks:
Volumetric attacks, specifically those that leverage the UDP protocol, are the most common method of DDoS attack. UDP floods involve sending a high number of User Datagram Protocol (UDP) packets to overwhelm the target network’s bandwidth.
While both a DDoS and DoS attack overload a server and interrupt, crash, or corrupt its services, there is a distinct difference between the two.
A denial-of-service (DoS) attack is any attack that causes a service to become unavailable, while a distributed denial of service (DDoS) attack is a specific type of DoS attack that uses multiple compromised devices to flood a server to make an online service unavailable by temporarily interrupting or suspending the services of its hosting server.
Due to an attack being distributed across hundreds or thousands of devices globally and usually initiated by an anonymous source, DDoS attack methods are very difficult to trace.