DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge volumes of traffic to overwhelm a server or network, slowing it or rendering it completely unresponsive. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
Recent examples of DDoS attacks include the record-breaking DDoS attack on code repository Github a few weeks ago. GitHub was taken offline for about 10 minutes by an attack that peaked at 1.35Tbps. The latest DDOS attacks used Memcached-enabled servers to amplify their impact by 51,000 times. Ideally memcached servers should be off the grid and inaccessible via internet but there are many which are left exposed to the internet which leads to vulnerability in the systems.
Here are some preventive measures you can take in order to be safe from DDoS Attacks:
Get a clear picture of the evolving DDoS threats
The sophistication of DDOS attacks have evolved over the years, making it increasingly challenging to prevent. 71 % of the DDOS attacks last lesser than 10 minutes. The main aim of these attacks is to gauge the security levels and infrastructure of the organization, leaving just enough bandwidth for other cyber-attacks to infiltrate the network. It is salient to understand this in order to take preventive measures against it.
Cloud-based DDoS Protection Services
There are third-party services which offer cloud based DDoS Protection for the organizations. The best of the software will have a combination of on-premise DDoS-protection along with cloud-based protection. Time to mitigate a DDoS attack should be a major factor in deciding the third party vendor.
The increasing DDoS attacks are due to memcached servers on the internet. So it is a best practice to take them of the internet to the extent possible. Beyond that, it is always good to be prepared for a DDoS attack so it’s just a minor blip in their day, instead of entire business falling down.
Disabling port when not in use
If memcached servers are mandatory to be connected to internet for your organization, take active measures to shut down the ports which are never in use. Many recent attacks have been initiated by sending initial payloads via UDP packets. Hence, if TCP based traffic suffices your need, it is advisable to turn off the UDP ports. An active firewall would serve best for this.
DDoS attacks are destructive weapons for your business. Hence it is very essential to take DdoS Attack Protection steps before they actually take place in order to prevent possible business losses and to maintain your secure business reputation intact.