DDoS
Also known as: Distributed Denial-of-Service
A Distributed Denial-of-Service attack — coordinated traffic from many compromised devices that overwhelms a target and makes it unresponsive to legitimate users.
Last updated:
What is a DDoS attack?
A DDoS attack (Distributed Denial-of-Service) is an attempt to make an online service unavailable by flooding it with traffic from many coordinated sources. Unlike a simple DoS attack from a single host — which modern firewalls and rate limiters easily absorb — a DDoS attack uses hundreds of thousands to millions of compromised devices, making filtering at the destination alone impractical.
The sources are typically:
- Botnets of infected IoT devices, routers, and servers
- Compromised cloud instances rented with stolen credit cards
- Reflection / amplification from misconfigured public servers (more on this below)
- Booter / stresser services — illegal services that sell on-demand DDoS as a service
Attack categories
DDoS attacks fall into three broad categories based on which layer they target:
- Volumetric attacks flood the link itself with raw bandwidth (UDP floods, ICMP floods, amplification attacks). Measured in gigabits per second.
- Protocol attacks exhaust resources in firewalls, load balancers, or servers (SYN flood, ACK flood, fragmentation attacks). Measured in packets per second.
- Application-layer attacks target expensive operations — HTTP POSTs that trigger database queries, TLS handshake floods, HTTP/2 rapid reset. Measured in requests per second.
Amplification and reflection
Amplification attacks exploit misconfigured services (open DNS resolvers, NTP servers, memcached instances, older SNMP agents) that respond with a larger packet than they receive. The attacker spoofs the target's IP as the source address, and the reflector sends its oversized reply to the target. A memcached reflection can multiply a single byte of query traffic into 51,000 bytes of response traffic — the mechanism behind the 1.3 Tbps 2018 GitHub attack.
Mitigation
Effective DDoS defense is almost always upstream of the target:
- Scrubbing services (Cloudflare, Akamai, Google Cloud Armor, AWS Shield) absorb attacks at their edge
- BGP blackholing — your ASN advertises a null route for the target IP, dropping all traffic at peering points
- Rate limiting at the CDN or application edge
- Bot detection — distinguishing human traffic from automated floods using CAPTCHA or behavioral analysis
- Ingress filtering (BCP 38) — ISPs blocking spoofed source IPs at origin would largely eliminate amplification attacks, but adoption is still incomplete
Individual servers cannot defend against a large DDoS on their own — they need upstream help long before the traffic arrives.