Perpetrators of Denial-of-Service attacks attempt to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet. This is typically accomplished by flooding the targeted machine or resource with superfluous requests to overload the system and prevent some or all legitimate requests from being fulfilled.
A Distributed Denial-of-Service attack occurs when multiple systems flood the bandwidth or resources of a targeted system, often from thousands of hosts infected with malware. Since the incoming traffic flooding the victim originates from different sources, it becomes difficult to distinguish legitimate user traffic from attack traffic, especially when it is spread across multiple points of origin.
As part of Cybersecurity Week 2021, CRN spoke with 10 vendor executives about the evolution of DDoS attacks from an ideological weapon wielded by hacktivists to an easily monetizable tool used by cybercriminals. From targeting nontraditional infrastructure and using novel protocols to exploiting weak IoT device credentials and taking over devices with Mozi botnets, here are the most alarming DDoS attack trends.