Subscribe to wiki

Share wiki

Distributed Denial-of-Service (DDoS) Attack

Wiki Powered byIconIQ
Distributed Denial-of-Service (DDoS) Attack

Distributed Denial-of-Service (DDoS) Attack

A distributed denial-of-service (DDoS) attack is a deliberate effort to disturb the regular flow of traffic to a specific server, service, network, or . This disruption is achieved by overwhelming the target or its associated infrastructure with an excessive volume of Internet traffic. Once a DDoS attack is initiated on a particular computer, it can quickly propagate to other systems within the same network, potentially resulting in severe system failures. [1][2]

Overview

A denial-of-service attack is a type of cyber attack that aims to limit or block access to a computer or network, thereby preventing authorised users from using it. Denial-of-Service (DoS) attacks are widely used by hackers to disrupt the regular functioning of computer-based services. A distributed approach is considered highly effective for executing such an attack. [3]

Distributed denial-of-service (DDoS) attacks are prevalent types of malware attacks. To execute a DDoS attack, hackers inject malware into networks, , or services and overload it with transactions. [3][4]

exchanges have faced a rising number of DDoS attacks due to their surging popularity. Starting in 2020, several significant crypto exchanges have encountered multiple attempts of DDoS attacks, resulting in prolonged service unavailability. [3]

Botnets

Botnets serve as a primary method for executing distributed denial-of-service (DDoS) attacks. In this scenario, the attacker gains unauthorized access to computers or devices and installs a malicious code, commonly referred to as a bot. These compromised devices collectively form a network known as a botnet. The attacker then commands the botnet to flood the target's servers and devices with an excessive volume of connection requests, surpassing their capacity to handle them effectively.[2][4][5]

Types of DDoS Attacks

Application Layer Attacks

These attacks are designed to overwhelm a specific aspect of an application or service. They can be successful even with a small number of attacking machines generating a low traffic rate, which makes them challenging to detect and counteract.[1]

Protocol/TCP Connection Attacks

These attacks aim to exhaust all accessible connections to infrastructure devices like load balancers, firewalls, and application servers. Even devices equipped to manage state on a large number of connections can be incapacitated by these assaults.[1][5]

Volumetric Attacks

These attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.[1][2]

Examples of DDoS Attacks

The Dyn attack

Some of the largest DDoS attacks have come against companies that provide online services. Dyn is a DNS provider and registrar, meaning they hold and register domain names for individuals and companies with websites. In October 2016, Dyn was attacked by the Mirai botnet. Dyn’s impacted clients include Netflix, PayPal, Amazon, Visa, and The New York Times. The Marai botnet used an Internet of Things (IoT) army, comprised of pretty much every IoT device you can think of, like smart TVs, printers, cameras, and much more, to overload the Dyn servers. Dyn resolved the attack within a day.[6]

The GitHub attack

In February 2018, hackers saw an opportunity to use a caching system known as Memcached to manually send 1.3 terabits per second (Tbps) of information to the GitHub servers, which means the hackers didn’t use the traditional zombie bot army. The Memcached servers made it so the hackers could amplify their attack by 50,000 times. An alert was triggered within 10 minutes of the start of the attack, and the protection service stopped the DDoS attack before it got out of control.[6]

The AWS attack

In February 2020,  Amazon Web Services (AWS) was attacked and saw as many as 2.3 Tbps coming into its servers. The hackers hijacked user directories on Connection-less Lightweight Directory Access Protocol (CLDAP) servers to flood the AWS servers with massive amounts of information. Amazon was able to mitigate the attack before it became a security risk for its users. At the time, the attack on AWS was the largest DDoS attack to date.[6]

The EXMO Exchange

In February 2021, the EXMO exchange experienced a DDoS attack that incapacitated its operations for nearly five hours.[1]

The Solana

In February 2022, the network faced a DDoS attack, causing approximately four hours of downtime. Solana.Status indicated that the network regained full functionality with 100% uptime during that timeframe.[1]

The Arbitrum One

encountered a transaction flood that overwhelmed the Sequencer, leading to its temporary unavailability for about 45 minutes. During this period, incoming transactions were queued, but no new transactions could be accepted or added to the due to the Sequencer's offline status.[1]

How to Prevent DDoS Attacks

The key defences against DDoS Attacks are to ensuring that nodes have sufficient storage, computing power, and network bandwidth, as well as to include failsafes into the code. In general, the more decentralized a blockchain network is, the more resistant it is to DDOS attacks.

See something wrong?

Edited By

Generated avatar for Anonymous userJaewon_Cho

Edited On

November 24, 2023

REFERENCES

[1]

What is a DDoS Attack? How Can it Affect Crypto?

Aug 15, 2023

[2]

What Is A DDoS Attack?

Aug 15, 2023

[3]

What Is a Denial-of-Service (DoS) Attack?

Aug 15, 2023

[4]

What is Distributed Denial of Service (DDoS) Attack?

Aug 15, 2023

[5]

What is DDoS Attack?

Aug 15, 2023

[6]

Microsoft - Top 5 most famous DDoS Attackes

Sep 20, 2023