Distributed Denial of Service (DDoS)

A distributed denial-of-service (DDoS) attack is a malicious method of disrupting the normal traffic of a targeted website, service, server or network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

In a distributed denial-of-service attack, the network layer can be targeted with volume flood attacks, network scans and intrusions that consume the network resources - making information unavailable for legitimate users.

The server layer can be disrupted through port scans, DoS attack tools and other attacks that misuse the resources of the server. Finally, the application layer is vulnerable to a wide-range of attacks that exploit holes in the application security, consuming resources or executing malicious commands.

During the attack, the attackers may flood a network with requests and information. Flooding can be accomplished by a dedicated group of attacker voluntarily using their own machines - such as distributed denial of services attacks from a "hacktivist" group or other organized entity - or they can hijack machines to use for the attack. They may also scan applications and servers for possible exploits or attempt to force access to sensitive data.

The motives for attack may differ - from "hacktivism" to criminal intent - and the methods can change. A robust security suite is necessary to ensure that networks and sites are protected from the latest advances in this constantly evolving landscape.

Ransom denial-of-service (RDoS) attacks are a threat technique used by attackers to target companies and extort their victims. Attackers threaten DoS attacks, which can disrupt online services and impact the business operations, productivity and reputation of an organization, unless the company pays a ransom demand.

Unlike Ransomware attacks, RDoS and DDoS attacks in general do not breach networks or systems. No data is stolen or compromised during the attacks.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center