• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Firewall • Network Security • UTM  /  DDoS attacks – Protection is better than cure
DDoS attacks – Protection is better than cure
05 July 2019

DDoS attacks – Protection is better than cure

Written by Snehit Deokar
Snehit Deokar
Cybersecurity, Firewall, Network Security, UTM

DDoS Attacks on Rise…. 

As per recent cyber security reports, there has been a rise in DDoS attacks in Q1 2019, with number of attacks lasting more than an hour. Many researchers believe that cyber attackers who had been doing DDoS attacks for monetary gain, had focused their attention on income sources like crypto mining. The decrease in crypto mining activity has once again led to increase in DDoS attacks.

What are DoS and DDoS Attacks? 

A denial of service (DoS) attack is a strategy in which unknown zombie aims to prevent others from accessing web server, web application or cloud service, by flooding them with service requests from single origin, rendering target internet service inaccessible.

On the other hand, distributed denial of service (DDoS) attack is a DoS attack from multiple sources on different networks disrupting any service like mobile application API’s, web pages, email services or DNS services. 

Why DDoS Attacks? 

Attacker might be doing these attacks for fun, to slow down competitor business, public votes, monetary gains or other income sources like crypto mining etc. DDoS attacks can even cover up for stealing valuable data from victims.

Types of DDoS Attacks? 

Basic DDoS attacks include UDP Flood, SYN Flood, ICMP (Ping) flood, DHCP starvation attack, Ping of Death attack.

UDP Flood 

Flooding random ports on remote host with UDP packets. Victim continuously check for application listening on that port when no application found, victim replies with ICMP destination unreachable repeatedly. Hence resulting in victim resources exhaustion, leading to inaccessibility.

SYN Flood 

Flooding SYN requests or even spoofing SYN requests for which no ACK will be received. Victim waits for acknowledgement from flooder for each request binding resources until new connection can be made then resulting in denial of service.

ICMP (PING) Flood 

Flooding ICMP Echo Request packets without waiting for replies. Victim keep on generating ICMP Reply Packets for each request leading to exhaustion of both incoming and outgoing bandwidth, leading to system slowdown.

Ping of Death Attack 

Flooding of malformed or malicious pings. Victim ends up with IP packet exceeding 65,535 bytes when reassembled. This results in overflow of memory buffers allocated for packet ending up in denial of service for legitimate packets.

DHCP Starvation attack 

Flooding DHCP Discover Packets to DHCP servers with intent of exhausting all IP addresses that can be allocated by DHCP server, resulting in denial of service for legitimate network users.

Business Impact of DDoS attacks… 

Generating DDoS attacks is not much expensive but then it can have huge impact on business. Imagine a service down for 24 hours; in addition to financial loss, company’s reputation is also at risk. In 2015, BBC’s server was flooded with traffic of 602 Gbps leading to collapse of BBC’s sites and content services provided by BBC’s server [1][2]. There are many more countless examples. IT administrator contact 3rd Party vendor to resolve this issue. Delay in controlling DDoS attack circumstances may lead competitor to quickly step in. 

So, isn’t protection against DDoS attacks better than cure? 

Day by day internet speeds are increasing, our application server could be attacked by hackers with high volume connections, which results in denial of service scenarios. We need to protect them from DoS and DDoS attack. So, what’s the solution?

Protect your application servers with Seqrite UTM, a gateway security solution.  

SEQRITE UTM (Unified Threat Management) has excellent Gateway Security Solution against DDoS attacks. It provides protection against DoS/DDoS attacks for SYN Flood, ICMP/ICMPv6 Flood and UDP Flood. 

References 

1.https://www.csoonline.com/article/3020292/cyber-attacks-espionage/ddos-attack-on-bbc-may-have-been-biggest-in-history.html 

2.https://www.cyberdefensehub.com/famous-ddos-attacks/

 Previous PostProtect sensitive information with Seqrite Encryption
Next Post  Email could be one of the simplest ways for hackers to breach you...
Snehit Deokar

About Snehit Deokar

Snehit has 3 yrs of experience in Fixed Networks. Currently part of UTM Team in Quick Heal. He holds Master of Technology from Vellore Institute of Technology in...

Articles by Snehit Deokar »

Related Posts

  • GDPR vs. DPDP: A Guide for Businesses Navigating Global Data Privacy

    May 7, 2025
  • Threat Actors are Targeting US Tax-Session with new Tactics of Stealerium-infostealer

    April 30, 2025
  • The DPDP Act 2023 Guide for Healthcare Leaders

    April 25, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies