Skip to content

Denial of Service (DoS/DDoS)

ddos.png

A Denial of Service (DoS) attack is a cyber attack that aims to make a website, service, or system unavailable by overwhelming it with excessive traffic. This prevents legitimate users from accessing the service.


How Does a DoS Attack Work?#

  • Attackers send a massive number of requests to a website or online service.
  • The system becomes overloaded and either stops working or slows down significantly.
  • This prevents real users from accessing the website or system.

A DoS attack typically originates from a single computer or internet connection.


What is a Distributed Denial of Service (DDoS) Attack?#

A Distributed Denial of Service (DDoS) attack is a larger, more powerful version of a DoS attack. Instead of using one computer, attackers use multiple devices (often globally distributed) to launch the attack simultaneously.

How Does a DDoS Attack Work?#

  • Attackers infect thousands (or millions) of computers, routers, or IoT devices with malware.
  • These infected devices (called a botnet) are controlled remotely.
  • The botnet sends massive amounts of fake traffic to the target.
  • The target website or service crashes or slows down significantly.

Key Differences Between DoS and DDoS#

DoS Attack DDoS Attack
Uses one computer or connection. Uses many computers across different locations.
Easier to block. Harder to block because traffic comes from different sources.
Slows down or crashes a service. Can completely take down large services or organizations.

Why Are Organizations Targeted?#

Organizations can be targeted for multiple reasons, including: - Political or ideological reasons – Hacktivists may attack organizations supporting certain causes. - Financial extortion – Attackers may demand ransom payments to stop the attack. - Disruption of services – Competitors or cybercriminals may attempt to take down critical services.


How to Protect Against DoS and DDoS Attacks#

Even with minimal cybersecurity knowledge, organizations can take simple steps to reduce the risk of an attack:

✅ Use a Content Delivery Network (CDN) – Services like Cloudflare, Akamai, or AWS Shield help filter out malicious traffic.
✅ Enable DDoS protection – Many hosting providers offer built-in protection—contact your IT team or hosting provider for details.
✅ Monitor your website traffic – Look for sudden spikes in visitors, which could indicate an attack.
✅ Limit access to critical systems – Use firewalls to block unusual or suspicious traffic.
✅ Have an emergency response plan – Know what steps to take if your organization's website or systems go offline due to an attack.


Signs That You Are Experiencing a DoS/DDoS Attack#

1. Website or Online Services Become Slow or Unresponsive#

  • Pages take too long to load or fail to load.
  • Forms, payment portals, or logins do not function properly.

2. Unusual Traffic Spikes from Unknown Sources#

  • A sudden and massive increase in visitors from unusual locations.
  • Traffic coming from one country or region where you don’t normally have users.
  • Many requests targeting a single page, such as login or donation pages.

3. Website or Server Crashes Repeatedly#

  • The system restarts or becomes completely unavailable.
  • You receive alerts from your hosting provider about excessive resource usage.

4. Unusual Activity in Server or Network Logs#

  • A large number of requests from the same IP address (in a DoS attack).
  • Thousands or millions of requests from different IPs worldwide (in a DDoS attack).
  • Requests targeting a single webpage or service repeatedly.

5. High Bandwidth or CPU Usage#

  • Your server, router, or firewall shows extreme network traffic.
  • CPU and memory usage spike to 100%.
  • Your internet connection slows down significantly.

How to Confirm a DoS/DDoS Attack#

If you notice the above signs, follow these steps to confirm whether your organization is under attack:

Step 1: Check Your Website Status#

  • Try loading your site from different devices and internet connections.
  • Ask staff or partners in different locations if they experience the same issue.
  • Use online tools like:
  • DownForEveryoneOrJustMe to check global availability.

Step 2: Check Traffic in Web Analytics#

  • Log into Google Analytics, Cloudflare, or your hosting provider’s analytics.
  • Look for traffic spikes from unusual countries or IPs.

Step 3: Review Server and Network Logs#

  • If you have access to server logs, look for:
  • A large number of repeated requests from the same IP.
  • Requests targeting a single webpage or service repeatedly.
  • Run the following Linux command to check for high network connections:
    netstat -an | grep :80 | wc -l
    

Step 4: Check Bandwidth and Resource Usage#

  • Log into your hosting provider’s dashboard and check:
  • CPU and memory usage.
  • Bandwidth usage—a sudden increase could mean an attack.

Step 5: Ask Your Hosting Provider or IT Support#

  • Many hosting providers detect and report DDoS attacks automatically.
  • Contact your web host or IT team to check for alerts or blacklisted IPs.

What to Do If You Confirm a DoS/DDoS Attack#

If you confirm that your organization is under attack, take these immediate steps:

✅ Enable DDoS Protection – Activate "Under Attack" mode if using Cloudflare, Akamai, AWS Shield, or similar services.
✅ Block Malicious IPs – Use your server’s firewall to block suspicious traffic.
✅ Rate-Limit Requests – Restrict the number of requests an IP can send per second.
✅ Inform Stakeholders – Let staff, partners, and users know about the issue.
✅ Contact Your Hosting Provider – They may provide emergency DDoS mitigation services.

By following these steps, you can minimize downtime and protect your organization's digital assets from DoS and DDoS attacks.