{"id":637,"date":"2020-01-28T11:08:00","date_gmt":"2020-01-28T11:08:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=637"},"modified":"2025-04-28T12:25:18","modified_gmt":"2025-04-28T12:25:18","slug":"what-is-ddos-breaking-down-a-distributed-denial-of-service-attack","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/","title":{"rendered":"What Is DDoS? Breaking Down a Distributed Denial of Service Attack"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">DDoS attacks cost organizations an average of $221,836 in downtime per attack\nand cause service disruptions for millions of customers globally<\/h2>\n\n\n\n<p>\u201cThis page isn\u2019t working.\u201d \u201cThis site can\u2019t be reached.\u201d\n\u201cThis service is unavailable.\u201d <\/p>\n\n\n\n<p>Error 503 messages are things that no one ever wants to see on their website. They cause CISOs and IT managers worldwide to reach for antacids. These messages sometimes appear when sites undergo general site maintenance. But they also can result from malicious DDoS attacks \u2014 attacks that <a href=\"https:\/\/www.netscout.com\/worldwide-ddos-prevention-solutions-2019\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">NETSCOUT reports<\/a> could cost businesses more than $221,000 per attack in just downtime. This doesn\u2019t even include other related costs and reputational damage. <\/p>\n\n\n\n<p>But what is DDoS and what does it mean for your website?\nWe\u2019re going to dive into what is considered a DDoS attack, how it works, and\nwhat you can do to protect your website.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is DDoS? Or, More Specifically, What Is a DDoS Attack?<\/h2>\n\n\n\n<p>When you go to a website and it fails to load, saying the server is busy, it\u2019s possible that your website has experienced a DDoS attack, or what\u2019s more specifically known as a <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-a-ddos-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">distributed denial of service attack<\/a>. If you\u2019re familiar with what a denial of service (DoS) attack is, then you\u2019re already ahead of the game when it comes to understanding what a DDoS attack is.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">To Understand DDoS Attacks, You First Need to Understand DoS Attacks<\/h3>\n\n\n\n<p>A denial of service attack occurs when an attacker uses a\nsingle device and internet connection to target your system with repeated\nrequests for service. Essentially, it\u2019s a rapid assault that intends to\noverwhelm it to knock your systems offline or make them unresponsive to your\ncustomers and users. <\/p>\n\n\n\n<p>Now, let\u2019s take a DoS attack and kick it up to the next\nlevel. That\u2019s what you get with a DDoS attack. But what exactly is a DDoS\nattack? Much as the name suggests, a distributed denial of service attack\ndisrupts service for genuine users. Basically, your server or system is being taxed\nby more traffic or service requests than it can handle. This occurs when\nmultiple compromised systems \u2014 potentially hundreds or thousands \u2014 with\nmultiple internet connections to target a single website, service, or system with\nthe goal of making that target unresponsive. <\/p>\n\n\n\n<p>Some examples of real-world DDoS attack victims include <a href=\"https:\/\/www.thesslstore.com\/blog\/largest-ddos-attack-in-history\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">GitHub<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/2597532\/playstation-network-crippled-by-ddos-attack.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">PlayStation Network<\/a>, <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber\/cyber-attacks-disrupt-paypal-twitter-other-sites-idUSKCN12L1ME\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">PayPal, Twitter, and Spotify<\/a>. It stops people from accessing the target\u2019s websites and services so real customers who pay for and use the affected services can\u2019t do so. <\/p>\n\n\n\n<p>So, translation: DDoS Attackers = Jerks. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exploring How a Distributed Denial of Service Attack Works<\/h3>\n\n\n\n<p>Still not quite sure how a DDoS attack works? Let\u2019s imagine\nthe following scenario:<\/p>\n\n\n\n<p><em>You\u2019re a server at a restaurant. You\u2019re typically\nassigned a section of five to eight tables to wait on and take care of customers.\nOn a regular workday, you can handle this load with ease. Everything\u2019s going\ngreat, your customers are getting their food, and everyone\u2019s happy with the\nservice they\u2019re receiving. <\/em><\/p>\n\n\n\n<p><em>Now, imagine that a big crowd of people walk in and\ndecide to sit at 20 tables surrounding your section. Suddenly, they\u2019re calling\non you, demanding that you wait on them. They\u2019re impatient, and they keep\nflagging you down to get your attention. When walk over to assist them, they\nthen ignore you. You quickly realize that you no longer have the bandwidth to\nserve your assigned tables and begin feeling overwhelmed. You\u2019re rushing from\ntable to table, trying to take order, refill drinks, and deliver food to these\nnew customers \u2014 all the while, still trying to take care of your assigned\ncustomers. <\/em><\/p>\n\n\n\n<p><em>While rushing out of the kitchen with an overloaded tray\nof food for one of your original tables, one of the rude and demanding customers\nat the table closest to the door suddenly backs their chair into you. You \u2014 as\nwell as the tray of entrees \u2014 crash to the floor. Food goes everywhere,\ncreating a huge mess \u2014 and your original customers aren\u2019t happy. They\u2019re not getting\nthe service they need and they\u2019re tired of waiting. They decide to leave to get\nbetter service elsewhere. <\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SYN Floods and Other Types of DDoS Attacks<\/h3>\n\n\n\n<p>The situation above is a lot like what the U.S. Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA) would describe as a <a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-015\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">SYN flood<\/a> DDoS attack. During such an attack, a cybercriminal sends unwanted traffic from multiple connections to your site to overwhelm it. What they do is repeatedly send connection requests without ever following through with the three-way handshake to complete the connection; this leaves your system waiting for a response that never comes. (Like the impatient tables of customers in the example who showed up, demanded your attention, and then proceeded to ignore you.)<\/p>\n\n\n\n<p>As the CISA website states: \u201cThe incomplete handshake leaves the connected port\nin an occupied status and unavailable for further requests. An attacker will\ncontinue to send requests, saturating all open ports, so that legitimate users\ncannot connect.\u201d <\/p>\n\n\n\n<p>However, SYN floods are just one type of DDoS attack \u2014 there are many others that we haven\u2019t even mentioned. According to <a href=\"https:\/\/www.imperva.com\/blog\/security-glossary-top-12-ddos-attack-types-need-know\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Imperva<\/a>, the top 12 types of DDoS attacks are:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>DNS amplification attacks<\/li><li>UDP floods<\/li><li>DNS floods<\/li><li>HTTP floods<\/li><li>IP fragmentation attacks<\/li><li>NTP amplification<\/li><li>Ping floods<\/li><li>SNMP reflection<\/li><li>Flood attacks (which we discussed moments ago)<\/li><li>Smurf attacks<\/li><li>Pings of Death<\/li><li>Fork Bombs<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">BotNets Are the Cheapest, Most Effective Methods of DDoS Attacks<\/h2>\n\n\n\n<p>Modern DDoS attacks virtually always use botnets. Botnets are a network of insecure, connected devices \u2014 everything from smart baby monitors to connected office printers \u2014 that are hijacked without their owners even knowing it! The Internet of Things (IoT) market is ripe with opportunities for hackers and other cybercriminals. That\u2019s because <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/\" target=\"_blank\">IoT devices<\/a> are known for being insecure. And for cybercriminals, they can rent out botnets (or DDoS attack-for-hire services) at little cost. <\/p>\n\n\n\n<p>Although device certificates, firewalls, and other tactics\ncan be used to help increase IoT device security, the overwhelming majority of\nmanufacturers don\u2019t bother installing them. <\/p>\n\n\n\n<p>BotNets allow hackers to do many things, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Launch major DDoS attacks against computer\nsystems and websites.<\/li><li>Scale their attacks <\/li><li>Mine cryptocurrency to steal funds that are\nvirtually untraceable. <\/li><li>Route traffic and spoof IP addresses to make their\nattacks appear to originate from other locations.<\/li><\/ul>\n\n\n\n<p>But, wait, don\u2019t all DDoS attackers use botnets? Not necessarily. Smaller attacks can be performed by multiple attackers who are working together while using multiple internet connections and\/or devices. However, the most significant attacks use botnets because an attacker would need to own thousands of devices, which is just about impossible (or, at the very least, extremely unlikely). <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Causes of DDoS Attacks<\/h2>\n\n\n\n<p>DDoS attacks can occur for a multitude of reasons. For\nexample, some hackers think they have something to prove; for others, the\nreasons are motivated by other factors: <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Money, Money, Money <\/h3>\n\n\n\n<p>Yeah, we know you were singing that in your head as your\nread it. Financial gain is a <em>huge<\/em> motivator for many hackers. And\nfrankly, DDoS attacks are potentially profitable in two main ways:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>DDoS ransom attacks<\/strong> \u2014 This occurs when a\nhacker launches DDoS attacks and offers to halt their onslaught if the target\npays a \u201cransom.\u201d<\/li><li><strong>DDoS services for hire<\/strong> \u2014 Yes, you read\nthat right. There are hackers and companies that offer DDoS services for hire. <\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Hacktivism and Nation-States<\/h3>\n\n\n\n<p>Whether it\u2019s for political, social, or other reasons, some hackers use DDoS attacks to attack, fight, or protest something (or someone). These types of cyberattacks can involve leaking or publishing sensitive information, defacing websites, or taking websites offline entirely through DDoS attacks. Is <a href=\"https:\/\/www.wired.com\/story\/hacktivism-sudan-ddos-protest\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">hacktivism on the rise<\/a> or <a href=\"https:\/\/securityintelligence.com\/posts\/the-decline-of-hacktivism-attacks-drop-95-percent-since-2015\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">is it declining<\/a>? The answer really depends on whom you ask. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Diversion<\/h3>\n\n\n\n<p>Another tactic that cybercriminals use is to launch DDoS\nattacks to serve a larger goal. Essentially, it\u2019s a cover-up attack they\nimplement to hide their real move, which may be a cyberattack on another area\nof an organization. The idea is that if they can distract the target by making\nthem pay attention to the DDoS attack, the idea would be that their real attack\nmay go unnoticed in the chaos. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dissecting the DDoS Attack Meaning and Costs for Your Business<\/h2>\n\n\n\n<p>So, what does a DDoS mean for your business? Well, for\nstarters, a successful DDoS attack means you\u2019re going to have some very unhappy\ncustomers. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DDoS Attack Costs: Unhappy Customers <\/h3>\n\n\n\n<p>I remember several years ago feeling extremely frustrated while playing World of Warcraft (don\u2019t judge me, it\u2019s a great game!) when the <a href=\"https:\/\/www.forbes.com\/sites\/davidthier\/2014\/11\/14\/blizzard-confirms-ddos-attack-on-world-of-warcraft\/#34a403fa32eb\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">gaming servers kept going down mid-raid<\/a>. As a player with a paid subscription, I had to keep checking the <a href=\"https:\/\/worldofwarcraft.com\/en-us\/game\/status\/us\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">WOW Realm Status<\/a> web page to see if there was any news about when the server would be back online. <\/p>\n\n\n\n<p>And as we all know: If your customers aren\u2019t happy, nobody\u2019s\nhappy!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DDoS Attack Costs: Downtime and Mitigation<\/h3>\n\n\n\n<p>DDoS attacks are also expensive. We already shared\nNETSCOUT\u2019s estimated costs of downtime at the beginning of the article. But\nthere are other costs associated with DDoS attacks \u2014 costs that include the\nlabor and infrastructure that are necessary to combat DDoS attacks, as well as\nthe reputational damage that may result from such an attack. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DDoS Attack Costs: Reputational Damage<\/h3>\n\n\n\n<p>If your website or service is frequently taken offline by\nhackers because you don\u2019t have the defense mechanisms in place to combat DDoS\nattacks, then your reputation is going to take a hit. The question is whether\nyour company can bounce back.&nbsp; <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What You Can Do to Protect Your Business<\/h2>\n\n\n\n<p>Wondering what you can do to protect your business? For\nstarters, you can <strong>invest in IoT device certificates.<\/strong> While this won\u2019t\nhelp you to protect your business from botnet attacks that user others\u2019\nconnected devices, it can help you not contribute to the larger issue by having\ninsecure devices. <\/p>\n\n\n\n<p>If your organization is under a DDoS attack, there are a\ncouple of ways you stop these attacks and protect your organization:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Use a combination of defense mechanisms to protect your\nnetwork and devices.<\/strong> For example, use a content delivery network (CDN) that has a\nweb application firewall (WAF) and built-in DDoS protection. Why? Because the CDN\nrests between your server and the offending attacker, you can block or lessen the\nattack before it reaches your web server.<\/li><li><strong>Take advantage of other existing solutions or protections\nthat may be available.<\/strong> For example, you should reach out to your web host to discover\nwhat DDoS-related policies and protections they have in place. Also, be sure to\ncheck to see what DNS flood protections your DNS provider may offer. <\/li><\/ul>\n\n\n\n<p>&nbsp;With these tactics in\nplace, any denial of service attack on your website can be thwarted\u2026 or, shall\nwe say, DENIED!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DDoS attacks cost organizations an average of $221,836 in downtime per attack and cause service disruptions for millions of customers globally \u201cThis page isn\u2019t working.\u201d \u201cThis site can\u2019t be reached.\u201d&#8230;<\/p>\n","protected":false},"author":8,"featured_media":638,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[32],"class_list":["post-637","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-ddos","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is DDoS? Breaking Down a Distributed Denial of Service Attack - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"What is DDoS? A DDos attack is a costly cyber attack that NETSCOUT reports can cost businesses more than $221,000 in downtime. Read on to learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is DDoS? Breaking Down a Distributed Denial of Service Attack - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"What is DDoS? A DDos attack is a costly cyber attack that NETSCOUT reports can cost businesses more than $221,000 in downtime. Read on to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-28T11:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T12:25:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/what-is-ddos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"What Is DDoS? Breaking Down a Distributed Denial of Service Attack\",\"datePublished\":\"2020-01-28T11:08:00+00:00\",\"dateModified\":\"2025-04-28T12:25:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/\"},\"wordCount\":1815,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/what-is-ddos.jpg\",\"keywords\":[\"ddos\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/\",\"name\":\"What Is DDoS? Breaking Down a Distributed Denial of Service Attack - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/what-is-ddos.jpg\",\"datePublished\":\"2020-01-28T11:08:00+00:00\",\"dateModified\":\"2025-04-28T12:25:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"What is DDoS? A DDos attack is a costly cyber attack that NETSCOUT reports can cost businesses more than $221,000 in downtime. Read on to learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/what-is-ddos.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/what-is-ddos.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Graphic: What is a DDoS attack? Pins represent a network of IoT devices targeting one target\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is DDoS? Breaking Down a Distributed Denial of Service Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is DDoS? Breaking Down a Distributed Denial of Service Attack - InfoSec Insights","description":"What is DDoS? A DDos attack is a costly cyber attack that NETSCOUT reports can cost businesses more than $221,000 in downtime. Read on to learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/","og_locale":"en_US","og_type":"article","og_title":"What Is DDoS? Breaking Down a Distributed Denial of Service Attack - InfoSec Insights","og_description":"What is DDoS? A DDos attack is a costly cyber attack that NETSCOUT reports can cost businesses more than $221,000 in downtime. Read on to learn more.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/","og_site_name":"InfoSec Insights","article_published_time":"2020-01-28T11:08:00+00:00","article_modified_time":"2025-04-28T12:25:18+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/what-is-ddos.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"What Is DDoS? Breaking Down a Distributed Denial of Service Attack","datePublished":"2020-01-28T11:08:00+00:00","dateModified":"2025-04-28T12:25:18+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/"},"wordCount":1815,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/what-is-ddos.jpg","keywords":["ddos"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/","url":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/","name":"What Is DDoS? Breaking Down a Distributed Denial of Service Attack - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/what-is-ddos.jpg","datePublished":"2020-01-28T11:08:00+00:00","dateModified":"2025-04-28T12:25:18+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"What is DDoS? A DDos attack is a costly cyber attack that NETSCOUT reports can cost businesses more than $221,000 in downtime. Read on to learn more.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/what-is-ddos.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/what-is-ddos.jpg","width":1600,"height":1000,"caption":"Graphic: What is a DDoS attack? Pins represent a network of IoT devices targeting one target"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-ddos-breaking-down-a-distributed-denial-of-service-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is DDoS? Breaking Down a Distributed Denial of Service Attack"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=637"}],"version-history":[{"count":1,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/637\/revisions"}],"predecessor-version":[{"id":639,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/637\/revisions\/639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/638"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}