{"id":5401,"date":"2016-05-06T03:19:33","date_gmt":"2016-05-06T02:19:33","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5401"},"modified":"2021-04-06T03:25:13","modified_gmt":"2021-04-06T02:25:13","slug":"brief-history-ddos-defend-customers","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers","title":{"rendered":"A brief history of DDoS\u2026 and how to defend yourself and your customers"},"content":{"rendered":"<p>That a successful DDoS attack can flood your network, site or service with traffic that can grind it to a halt and effectively take you out of business, is unfortunately an all too well known fact. But how did it all start, and how can managed service providers (MSPs) help in putting a stop to it?<\/p>\n<p>In 1995, an Italian political collective called the Strano Network implemented the now infamous \u2018Net Strike\u2019 against various French government websites in protest against nuclear policies. This was the first Distributed Denial of Service (DDoS) attack I can recall hearing about as a veteran IT security journalist. The attack only lasted an hour, partly as Internet connectivity was costly and partly because the attack technology at the time was primitive and required actors to be glued to their terminals.<\/p>\n<p>Within a couple of years that technology had advanced, in great part courtesy of the Electronic Disturbance Theater (EDT) group, which developed its own attack tools in-house. None was more effective than FloodNet, which made targeted DDoS attacks a point and click affair. These \u2018sit-ins\u2019, as EDT called their attacks, hit both US and Mexican government sites as the 90s drew to a close.<\/p>\n<h3>From activism to hactivism<\/h3>\n<p>Fast forward 10 years and Anonymous managed to really exploit the notion of point and click attack technology along with crowd-sourced activism. The weapon of choice that facilitated the success of Anonymous was the Low Orbit Ion Cannon (LOIC). This software essentially connected users, via an easy-to-use interface, to a vast network of computer resources; a botnet. The thing to keep in mind is that this was not a zombie network of malware infected PCs and unaware owners, but rather people volunteering to donate their resources into an attack. A target was chosen, the cannon was pointed at that site, and when the command was given everyone fired\u2026<\/p>\n<p>Hacktivism makes DDoS sound like a legitimate method of protest, but the truth is it\u2019s far more likely to be used for criminal gain. Just look at some of the bigger attacks of recent times, both in terms of the bandwidth used and the media headlines generated, if proof were needed. When The LizardSquad took out both the PlayStation Network and Microsoft\u2019s Xbox Live over the 2014 festive period, it wasn\u2019t for the \u201clolz\u201d or to make a political point. It was as a marketing tool to get publicity for the \u201cLizard Stresser\u201d DDoS-for-hire service it was touting on the <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-the-dark-web\"  data-wpil-monitor-id=\"32\">dark web<\/a>. Similarly, at the start of this year when New World Hacking claimed responsibility for what was reported as the biggest DDoS attack, by volume of traffic, in the form of a 600Gbps volumetric attack against the BBC, the reason was to show what its \u201dBangStresser\u201d tool was capable of.<\/p>\n<p>Perhaps understandably, it\u2019s these big downtime attacks that attract the equally big media headlines. There\u2019s an instinctive tendency for reporters to be attracted to the \u201clargest DDoS attack ever\u201d, yet there\u2019s a case to be made that smaller attacks are more worrying. These lower-level attacks, lasting for shorter periods and degrading network performance without closing it down altogether, are most often used as a smokescreen for other malicious activity. The targeted business finds its IT teams distracted with the job of getting the network\/site running at full capacity; meanwhile the attackers are exploiting vulnerabilities, installing malware and so on.<\/p>\n<h3>Time to get stressed about DDoS?<\/h3>\n<p>According to a recent\u00a0<em><a class=\"ext\" href=\"http:\/\/www.infosecurity-magazine.com\/news\/ddos-attacks-jump-nearly-150-in-a\/\" target=\"_blank\" rel=\"noopener noreferrer\">Infosecurity magazine report<\/a><\/em>\u00a0DDoS attacks were up by 149% year-on-year, and showed a 40% spike in the last quarter of 2015 alone. Not really a great surprise to anyone who has spent any amount of time researching how the bad guys operate, as the availability and low rental cost of \u201cstresser\u201d botnet resources makes it the weapon of choice. And it\u2019s a weapon that causes plenty of collateral damage.<\/p>\n<p>Indeed, according to one recent\u00a0DDoS Impact Survey, it wasn\u2019t the immediate loss of revenue (34%) that was most damaging to a business, but the ongoing loss of trust (45%) resulting from the attack. Interestingly, that same survey revealed that while 30% were reliant on traditional security defences such as firewalls to defend against DDoS attack, 85% said they thought service providers should be protecting them and half were willing to pay a premium for this protection.<\/p>\n<p>This is good news for managed service providers (MSPs) who are ideally positioned to help combat the DDoS threat. How so? Well defending against DDoS can be an expensive business in as far as getting the right tools and infrastructure in place, but that\u2019s nothing compared to the cost of not having the skillset to properly implement your mitigation efforts when under fire.<\/p>\n<table>\n<tbody>\n<tr>\n<th><strong>Five things to take into account when thinking about DDoS defences<\/strong><\/th>\n<th><\/th>\n<\/tr>\n<tr>\n<td>\n<ol>\n<li>Some of the routes used to facilitate a successful DDoS attack can be relatively easily mitigated: public servers need to be behind the firewall, the firewall needs to be up to the job and a content delivery network (CDN) can be a lifesaver.<\/li>\n<li>An MSP will bring the expertise that smaller organisations in particular are often lacking when it comes to DDoS mitigation, and that means the ability to not just install but properly manage network monitoring resources that can spot an attack as it starts to approach a specified threshold.<\/li>\n<li>While all organisations are on the radar as far as the DDoS attacker is concerned, those employed in the ecommerce sector with high revenues but low IT staff numbers sit most boldly in the cross hairs. As such, these are ideal customers for the MSP to sell mitigation services to.<\/li>\n<li>Bandwidth buffering might seem like a bad idea, especially when over provisioning anything is going to have an associated budgetary implication; but the implications of not allowing for a bandwidth buffer is a false economy. Anything that can spike your traffic gets absorbed by such a buffer and means that customers don&#8217;t experience any access problems; if that surge is a malicious one then over provisioning can buy recognition and reaction breathing space.<\/li>\n<li>Compartmentalism is never a bad idea in terms of business continuity planning, especially when thinking about DDoS impact. If your web server hosting is managed off network then should it come under DDoS attack that traffic surge isn&#8217;t going to impact upon your VoIP or email service for example.<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Find out more about how to defend against this type of attack and what tools you need to protect your networks\u00a0by<a class=\"ext\" href=\"http:\/\/pages.logicnow.com\/Cyber-Threat-Guide_Gen-LP.html?_ga=1.189722408.2060008530.1448977820\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0downloading our free Cyber Threat Guide<\/a>.\u00a0<\/strong><\/p>\n<p><strong>If you want to know more about more about network attacks in general watch our Security Lead Ian Trump talking about this subject\u00a0<a class=\"ext\" href=\"https:\/\/www.youtube.com\/watch?v=jPmvPA0o3nU\" target=\"_blank\" rel=\"noopener noreferrer\">in this video<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>That a successful DDoS attack can flood your network, site or service with traffic that can grind it to a halt and effectively take you out of business, is unfortunately&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5401","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A brief history of DDoS\u2026 and how to defend yourself and your customers - N-able<\/title>\n<meta name=\"description\" content=\"Defending against DDoS attacks can be expensive for companies, but it&#039;s nothing compared to the cost of not proper mitigation strategies in place.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A brief history of DDoS\u2026 and how to defend yourself and your customers - N-able\" \/>\n<meta property=\"og:description\" content=\"Defending against DDoS attacks can be expensive for companies, but it&#039;s nothing compared to the cost of not proper mitigation strategies in place.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-06T02:19:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-06T02:25:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"A brief history of DDoS\u2026 and how to defend yourself and your customers\",\"datePublished\":\"2016-05-06T03:19:33+01:00\",\"dateModified\":\"2021-04-06T02:25:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers\"},\"wordCount\":1124,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers\",\"name\":\"A brief history of DDoS\u2026 and how to defend yourself and your customers - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2016-05-06T03:19:33+01:00\",\"dateModified\":\"2021-04-06T02:25:13+00:00\",\"description\":\"Defending against DDoS attacks can be expensive for companies, but it's nothing compared to the cost of not proper mitigation strategies in place.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A brief history of DDoS\u2026 and how to defend yourself and your customers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A brief history of DDoS\u2026 and how to defend yourself and your customers - N-able","description":"Defending against DDoS attacks can be expensive for companies, but it's nothing compared to the cost of not proper mitigation strategies in place.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers","og_locale":"de_DE","og_type":"article","og_title":"A brief history of DDoS\u2026 and how to defend yourself and your customers - N-able","og_description":"Defending against DDoS attacks can be expensive for companies, but it's nothing compared to the cost of not proper mitigation strategies in place.","og_url":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2016-05-06T02:19:33+00:00","article_modified_time":"2021-04-06T02:25:13+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"A brief history of DDoS\u2026 and how to defend yourself and your customers","datePublished":"2016-05-06T03:19:33+01:00","dateModified":"2021-04-06T02:25:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers"},"wordCount":1124,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["MSP Business"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers","url":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers","name":"A brief history of DDoS\u2026 and how to defend yourself and your customers - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2016-05-06T03:19:33+01:00","dateModified":"2021-04-06T02:25:13+00:00","description":"Defending against DDoS attacks can be expensive for companies, but it's nothing compared to the cost of not proper mitigation strategies in place.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/brief-history-ddos-defend-customers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/de\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"A brief history of DDoS\u2026 and how to defend yourself and your customers"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5401"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5401\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}