What is ddos
Last updated: April 1, 2026
Key Facts
- DDoS attacks come from thousands of compromised computers (botnets) simultaneously sending requests to one target
- Attackers can target websites, game servers, email systems, or any internet-connected service
- DDoS attacks cost victims money through downtime, lost sales, and emergency mitigation efforts
- Defense strategies include rate limiting, traffic filtering, redundant servers, and DDoS protection services
- Major DDoS attacks have peaked at over 700 billion requests per second targeting major companies
Understanding DDoS Attacks
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic to a targeted server, service, or network by overwhelming it with massive amounts of internet traffic. Unlike simple denial-of-service attacks that originate from a single source, DDoS attacks leverage multiple compromised computers or devices, making them significantly more difficult to stop and trace.
How DDoS Attacks Work
Attackers typically compromise thousands of computers and internet-connected devices (creating a botnet) without the owners' knowledge. These compromised machines, collectively called "zombies," are then instructed to simultaneously bombard a target with traffic or service requests. The sheer volume overwhelms the target's servers, network bandwidth, or both, causing legitimate users unable to access the service. Common DDoS methods include sending enormous numbers of ping requests, flooding with TCP connections, or leveraging legitimate services to amplify attacks.
Types of DDoS Attacks
- Volumetric attacks: consume bandwidth by flooding with massive data volume
- Protocol attacks: exploit weaknesses in network protocols like ICMP or DNS
- Application-layer attacks: target specific web applications or services with legitimate-looking requests
- Amplification attacks: use third-party servers to multiply traffic sent to targets
- Botnet attacks: utilize compromised devices coordinated across multiple networks
Impact and Consequences
DDoS attacks can cause service outages lasting from minutes to days, resulting in lost revenue, damaged reputation, and eroded customer trust. Organizations face costs for incident response, increased security infrastructure, and potential ransom demands from attackers. Industries most frequently targeted include financial services, e-commerce, government agencies, and online gaming platforms.
Defense and Mitigation
Organizations deploy multiple defensive layers including firewalls, intrusion detection systems, and DDoS-specific mitigation services. Content delivery networks (CDNs) distribute traffic across multiple servers, making DDoS attacks less effective. Rate limiting blocks excessive requests from suspicious sources, while redundant infrastructure ensures services remain partially available during attacks. Many companies subscribe to DDoS protection services that identify and filter malicious traffic before reaching target systems.
Legal and Ethical Considerations
DDoS attacks are illegal in most countries and constitute computer crime or cyberterrorism depending on severity and intent. Penalties include criminal charges, substantial fines, and imprisonment. Ethical hacking communities maintain strict codes against DDoS attacks despite their technical accessibility, emphasizing legitimate penetration testing and authorized security research instead.
Related Questions
How can I tell if a website is under a DDoS attack?
Typical signs include website unavailability, extremely slow loading times, intermittent service disruptions, or error messages from the server. Web hosts and major websites publicly announce DDoS incidents affecting their services.
Can small businesses be targeted by DDoS attacks?
Yes, attackers target businesses of all sizes. Small businesses sometimes face DDoS attacks from competitors or extortionists demanding ransom. Affordable DDoS protection services now make defense accessible even for small operations.
What should I do if my website is under a DDoS attack?
Contact your web hosting provider or DDoS mitigation service immediately. Enable DDoS protection features, implement rate limiting, and consider switching to a CDN that handles DDoS traffic. Document the attack for potential law enforcement reporting.
More What Is in Daily Life
Also in Daily Life
More "What Is" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- CISA - DDoS Attack InformationPublic Domain
- Wikipedia - Denial of Service AttackCC-BY-SA-3.0
- Cloudflare - DDoS Attack ExplanationEducational