What Is a DDoS Attack?

作者:Coursera Staff • 更新于

Learn more about distributed denial of service (DDoS) attacks, including the different attack types and tips for preventing them.

[Featured image] A cybersecurity analyst is working with physical servers while holding a laptop.

A distributed denial of service (DDoS) attack is a cyber threat that overwhelms an online resource with traffic, causing the web service to fail to operate normally and possibly even go offline. This threat is capable of doing significant harm to a business, preventing users from gaining access to sites, or significantly slowing down the web server to the point it becomes inaccessible.

Attacks can last for several hours and, in severe cases, prevail for multiple days. Many businesses and organizations rely heavily on their online platforms so a DDoS attack can come with significant consequences. 

Attackers may strategically time DDoS attacks during critical time periods. For example, an online retailer could suffer an attack on a high-volume shopping day such as Black Friday, where its website becomes inaccessible, causing it to lose a considerable amount of business. In some cases, its attackers may infiltrate databases during DDoS attacks and gain access to sensitive information due to security vulnerabilities being exploited. 

What is an example of a DDoS attack?

An example of a DDoS attack is an HTTP flood, during which the attackers aim to overwhelm the HTTP server by repeatedly requesting the page, eventually downing the service. Cybercriminals carrying out this activity use malicious software to infect many computers to send requests to the websites, making it seem like legitimate internet traffic.  

How to prevent DDoS attacks

Preventing and identifying DDoS attacks can come with challenges since it may be difficult to differentiate genuine traffic from attack traffic. One strategy for preventing DDoS attacks is rate limiting. Rate limiting puts a limit on the number of requests a server will accept over a given period of time. Web application firewalls (WAF) are especially useful in preventing application layer attacks by protecting the server from illegitimate traffic. 

Types of DDoS attacks

Here are the three main types of DDoS attacks:

  • Application layer attacks: Application layer attacks aim for the software that provides the web service. It typically exhausts the target’s resources making this type of DDoS attack challenging to defend against.

  • Protocol attacks: Protocol attacks, also known as state-exhaustion attacks, target firewalls or the device's operating system. This consumes the resources of these network-based devices and servers, causing the inaccessibility of web services.

  • Volumetric attacks: Volumetric attacks use extreme amounts of traffic to congest the target. This overwhelming flood of traffic consumes all of the available bandwidth, and services become unavailable as a result. 

Learn how to counter a DDOS and build cybersecurity skills on Coursera

If you’re ready to get started in a cybersecurity career, consider enrolling in the Google Cybersecurity Professional Certificate on Coursera. Learn how to use job essential tools like Splunk, Chronicle, playbook, and more. This program is designed ​​to help individuals with no previous experience find their first job in the cybersecurity field, all at their own pace. 

更新于
作者:

Editorial Team

Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...

此内容仅供参考。建议学生多做研究,确保所追求的课程和其他证书符合他们的个人、专业和财务目标。