What is ddos
Last updated: April 1, 2026
Key Facts
- DDoS attacks come from thousands of compromised computers (botnets) simultaneously sending requests to one target
- Attackers can target websites, game servers, email systems, or any internet-connected service
- DDoS attacks cost victims money through downtime, lost sales, and emergency mitigation efforts
- Defense strategies include rate limiting, traffic filtering, redundant servers, and DDoS protection services
- Major DDoS attacks have peaked at over 700 billion requests per second targeting major companies
Understanding DDoS Attacks
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic to a targeted server, service, or network by overwhelming it with massive amounts of internet traffic. Unlike simple denial-of-service attacks that originate from a single source, DDoS attacks leverage multiple compromised computers or devices, making them significantly more difficult to stop and trace.
How DDoS Attacks Work
Attackers typically compromise thousands of computers and internet-connected devices (creating a botnet) without the owners' knowledge. These compromised machines, collectively called "zombies," are then instructed to simultaneously bombard a target with traffic or service requests. The sheer volume overwhelms the target's servers, network bandwidth, or both, causing legitimate users unable to access the service. Common DDoS methods include sending enormous numbers of ping requests, flooding with TCP connections, or leveraging legitimate services to amplify attacks.
Types of DDoS Attacks
- Volumetric attacks: consume bandwidth by flooding with massive data volume
- Protocol attacks: exploit weaknesses in network protocols like ICMP or DNS
- Application-layer attacks: target specific web applications or services with legitimate-looking requests
- Amplification attacks: use third-party servers to multiply traffic sent to targets
- Botnet attacks: utilize compromised devices coordinated across multiple networks
Impact and Consequences
DDoS attacks can cause service outages lasting from minutes to days, resulting in lost revenue, damaged reputation, and eroded customer trust. Organizations face costs for incident response, increased security infrastructure, and potential ransom demands from attackers. Industries most frequently targeted include financial services, e-commerce, government agencies, and online gaming platforms.
Defense and Mitigation
Organizations deploy multiple defensive layers including firewalls, intrusion detection systems, and DDoS-specific mitigation services. Content delivery networks (CDNs) distribute traffic across multiple servers, making DDoS attacks less effective. Rate limiting blocks excessive requests from suspicious sources, while redundant infrastructure ensures services remain partially available during attacks. Many companies subscribe to DDoS protection services that identify and filter malicious traffic before reaching target systems.
Legal and Ethical Considerations
DDoS attacks are illegal in most countries and constitute computer crime or cyberterrorism depending on severity and intent. Penalties include criminal charges, substantial fines, and imprisonment. Ethical hacking communities maintain strict codes against DDoS attacks despite their technical accessibility, emphasizing legitimate penetration testing and authorized security research instead.
Related Questions
How can I tell if a website is under a DDoS attack?
Typical signs include website unavailability, extremely slow loading times, intermittent service disruptions, or error messages from the server. Web hosts and major websites publicly announce DDoS incidents affecting their services.
Can small businesses be targeted by DDoS attacks?
Yes, attackers target businesses of all sizes. Small businesses sometimes face DDoS attacks from competitors or extortionists demanding ransom. Affordable DDoS protection services now make defense accessible even for small operations.
What should I do if my website is under a DDoS attack?
Contact your web hosting provider or DDoS mitigation service immediately. Enable DDoS protection features, implement rate limiting, and consider switching to a CDN that handles DDoS traffic. Document the attack for potential law enforcement reporting.
More What Is in Daily Life
- What Is a Credit ScoreA credit score is a three-digit number, typically ranging from 300 to 850, that represents your cred…
- What Is CD rates make no sense based on length of time invested. Explain like I'm 5CD (Certificate of Deposit) rates often don't increase with longer lock-up times the way people expe…
- What is a phdA PhD (Doctor of Philosophy) is a doctoral degree earned after completing advanced academic research…
- What is a polymathA polymath is a person with deep knowledge and expertise across multiple different fields or academi…
- What is aaveAAVE stands for African American Vernacular English, a dialect with distinct grammar, pronunciation,…
- What is aarch64ARMv8-A (commonly called ARM64 or AArch64) is a 64-bit processor architecture developed by ARM Holdi…
- What is about menTopics and discussions about men typically encompass masculinity, male identity, gender roles, men's…
- What is abiturAbitur is the German academic qualification awarded upon completion of secondary education, typicall…
- What is abrosexualAbrosexual is a sexual orientation identity where a person's sexual attraction changes or fluctuates…
- What is abgABG is an Indonesian acronym standing for 'Anak Baru Gede,' which refers to adolescent girls or teen…
- What is aaaAAA batteries are a standard cylindrical battery size measuring 10.5mm in diameter and 44.5mm in len…
- What is aacAAC (Advanced Audio Codec) is a digital audio compression format that provides better sound quality …
- What is aaa gameAAA games are high-budget video games developed by large studios with budgets typically exceeding $1…
- What is a proxyA proxy is a server that acts as an intermediary between your device and the internet, forwarding yo…
- What is ableismAbleism is discrimination and prejudice against people with disabilities based on the assumption tha…
- What is absAbs, short for abdominal muscles, are the muscles in your core that flex your spine and stabilize yo…
- What is abortionAbortion is a medical procedure that ends pregnancy by removing the fetus before viability. It can b…
- What is accutaneAccutane (isotretinoin) is a powerful prescription medication derived from vitamin A used to treat s…
- What is acetaminophenAcetaminophen, also known as paracetamol, is an over-the-counter pain reliever and fever reducer use…
- What is acidAcid is a chemical substance that donates protons (hydrogen ions) to other substances, characterized…
Also in Daily Life
- How To Save Money
- Why are so many white supremacist and right wings grifters not white
- Does "I'm 20 out" mean youre 20 minutes away from where you left, or youre 20 minutes away from your destination
- Why are so many men convinced that they are ugly
- What does awol mean
- What does asl mean
- What does ad mean
- What does asap mean
- What does apex mean
- What does asmr stand for
- What does atp mean
- What causes autism
- What does abg mean
- What does am and pm mean
- What does a fox sound like
More "What Is" Questions
Trending on WhatAnswer
Browse by Topic
Browse by Question Type
Sources
- CISA - DDoS Attack Information Public Domain
- Wikipedia - Denial of Service Attack CC-BY-SA-3.0
- Cloudflare - DDoS Attack Explanation Educational