Information Security Buzz

The Anatomy of a DDoS Attack

The DDoS Environment

Before we look at how an attack affects you and everyone in your network, here’s a quick primer on what a DDoS attack is.

A typical brute force DDoS attack comes from a botnet – an enormous network of malware-infected devices, often numbering in the millions, that cyber criminals use to lock up your website. Many infected computers and mobile phones are unwitting components of a botnet as people browse the Internet unaware of enabling any malicious activity. This cycle perpetuates itself creating a self-sustaining chain of criminal activity.

At the center are the victims from whom the cyber criminal harvests data or leverages computing resources to conduct a DDoS attack.

d76d3009 453b 4579 8a95 fa6d355e45f6

The Victims

High-profile DDoS attacks are in the news constantly, but the truth is that anyone with a public web presence (small or large) is a potential target, including:

The Arms Dealers

We know the damage a botnet attack can cause. But who creates the traffic surge and how do they do it?

The Cyber Criminals

After the malware has been built and distributed, who uses it? And for what purpose? Here’s a short list of perpetrators:

Cybercrime and the Bottom Line

DDoS is serious business affecting e-commerce sites and corporate and online assets.

Even though DDoS attacks are often associated with large organizations, research shows that 51 percent of all companies (no matter the size) have experienced a distributed denial of service attack. And on average, all companies face nearly two successful cyberattacks per week.

Seventy percent of DDoS attack victims are targeted more than once. And surprisingly, 35 percent of all cybercrime comes from insiders like employees, contractors, and various business partners.

The Cost of Unlawful Entry

The fallout from a DDoS attack is substantial. The average cost to mitigate an attack is $408,292. In other words, it takes about 19 days (and over $21,000 per day) to resolve the problem. That’s a substantial amount of time, money, and energy.

To break it down even further, here’s a list of areas most financially impacted by a DDoS attack:

[su_box title=”About Imperva®” style=”noise” box_color=”#336588″]Imperva® (NYSE:IMPV), is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations. The Imperva Application Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the-minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California.[/su_box]

About the Author

Exit mobile version