History of Distributed Denial of Service Attack (DDoS)


To understand the Distributed Denial of Service (DDoS), a basic knowledge of Denial of Service (DoS) is essential as both of them are almost similar. In a DoS, a computer device, network or a website is attacked by the hackers who overwhelm the network by bombarding them with either data packets or requests pertaining to establishing a connection or seeking information. 


Understanding the Basics of Distributed Denial of Service Attack 

The device or network that is targeted under this attack is running with Transmission Control Protocol and Internet Protocol (TCP/IP) and therefore when a request has been made on the server it starts a process of authenticating it by locating the IP address of the sender.

Until the IP address is located and the communication established, the server will keep the connection open and will remain busy. Over and over again, requests are sent up to the point when the system is flooded by them and as frozen as a consequence. Talking about the distinction between DoS and DDoS, the only thing that distinguishes them is the measurement of the attack on which they are carried out. While DoS is a small scale attack in which a target is attacked by a single device, a DDoS attack goes on a larger scale by assigning multiple devices as the source of it.



Initially, the attack begins with only one device which is called the DDoS master. This DDoS master locates all the nearby devices that may be vulnerable and could easily be controlled. To gain control over those devices, mostly malware is used but only if guessing the correct password doesn’t work. All the devices under the control of DDoS master are called Zombies or Bots since they don’t have the functionality of their own while they are under control. The primary purpose of these cyber attacks is to deny the authorized user or users the services they are in need of as it can be assumed by the name itself.

There are three categories of DDoS attack:

• All the bandwidth or memory is consumed in the network-centric attack which also goes by the name of volumetric attack because of this specialty.

• In some of these attacks, the network or transport layer is also attacked if the hacker succeeds in finding a fault in protocols and using it for their advantage.

• Application Layer can also be attacked by the hackers but that counts as a totally separate category and is specifically named application-layer attack.

Leave a Reply