{"id":5982,"date":"2019-11-29T19:21:36","date_gmt":"2019-11-29T19:21:36","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5982"},"modified":"2025-05-23T14:03:16","modified_gmt":"2025-05-23T13:03:16","slug":"ddos-what-you-need-know","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know","title":{"rendered":"DDoS\u2014What You Need to Know"},"content":{"rendered":"<p>DDoS (or distributed denial of service) attacks have hit the headlines again recently with news that the\u00a0<a class=\"ext\" href=\"https:\/\/www.theguardian.com\/politics\/2019\/nov\/12\/labour-reveals-large-scale-cyber-attack-on-digital-platforms\" target=\"_blank\" rel=\"noopener noreferrer\">UK\u2019s Labour Party was attacked twice in the space of two days<\/a>.<\/p>\n<p>While generally not seen as a sophisticated form of attack, DDoS is a common threat vector and can be the precursor to other much more serious forms of attack. So it\u2019s something managed services providers (MSPs) and SMBs need to aware of, and have a plan for.<\/p>\n<p>So how do you defend against them? The first thing is you need to know what you\u2019re dealing with.<\/p>\n<h2>What are DDOS attacks?<\/h2>\n<p>DDoS attacks are designed to slow down or disrupt sites or services, hence, the term \u201cdenial of service.\u201d Attackers can succeed in doing this by either drumming up a large number of people to \u201chit\u201d a site at the same time, or they can technically engineer mass \u201ctraffic\u201d\u2014<a class=\"ext\" href=\"https:\/\/blog.eccouncil.org\/9-of-the-biggest-botnet-attacks-of-the-21st-century\/\" target=\"_blank\" rel=\"noopener noreferrer\">through the use of bot nets<\/a>\u2014to make the target system think it\u2019s being hit by real users. Whatever route they take, the ultimate goal of the cybercriminal here is to overwhelm the system beyond its capacity so it stops working. The DDoS attempts against the UK Labour Party were a typical example of this type of attack.<\/p>\n<h2>How serious are DDoS attacks?<\/h2>\n<p>When we think of cyberattacks, we think of three possible impacts involving confidentiality, integrity, and\/or availability. <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-a-ddos-attack\"  data-wpil-monitor-id=\"26\">DDoS attacks<\/a> impact the third leg of this stool, availability, and don\u2019t directly involve a loss of data or privacy. While this can be serious if you\u2019re talking about something like an attack against a utility provider, it is typically a less serious system performance disruption. It\u2019s also worth keeping in mind that DDoS attacks can be masks for other attacks. By keeping an MSP or IT department focused on dealing with the DDoS attack, cybercriminals can often launch a more serious and invasive attack in the background.<\/p>\n<p>Part of the impact of DDoS also has to do with timing. In the Labour Party instance, for example, the timing was about a month before the upcoming UK election. Another example of why timing can make a huge difference with DDoS was\u00a0<a class=\"ext\" href=\"https:\/\/www.informationsecuritybuzz.com\/expert-comments\/amazon-invited-ddos-attack-on-prime-day\/\" target=\"_blank\" rel=\"noopener noreferrer\">the attack against Amazon on Prime Day<\/a>\u00a0in July of last year. The service was down for approximately an hour, costing the retailer an estimated $75 million USD.<\/p>\n<p>So the potential seriousness of this attack in the UK is more about the fact that the UK\u2019s Labour Party may now be on someone\u2019s radar. This kind of attack could be an initial attempt to do harm, with more serious attacks to follow.<\/p>\n<p>\u201cIf this is a sign of things to come in this election, I feel very nervous about it all, because a cyberattack against a political party in an election is suspicious and something one is very worried about,\u201d\u00a0<a class=\"ext\" href=\"https:\/\/www.computerweekly.com\/news\/252473876\/Attack-on-Labour-shows-need-for-DDoS-defence-but-should-alarm-few\" target=\"_blank\" rel=\"noopener noreferrer\">said Labour leader Jeremy Corbyn<\/a>.<\/p>\n<h2>How can businesses prevent DDoS attacks?<\/h2>\n<p>We\u2019re living in a world where everything is connected. This means criminals now have many more internet-enabled entry points. Today things like baby monitors, cameras, or even refrigerators can all be compromised and utilized in an attack (as part of a bot net). Businesses that rely on uptime need to put services in place, usually through their ISP or global service provider, that can help them be more resilient to DDoS attacks\u2014for example, in the Labour Party\u2019s case, their hosing provider, Cloudflare, claimed its network capacity was\u00a0<a class=\"ext\" href=\"https:\/\/www.computerweekly.com\/news\/252473876\/Attack-on-Labour-shows-need-for-DDoS-defence-but-should-alarm-few\" target=\"_blank\" rel=\"noopener noreferrer\">15 times greater than the biggest DDoS attack ever recorded<\/a>.<\/p>\n<p>Locking down internet-connected devices is important, but network security is just as important\u2014even more so when it comes to DDoS protection. Network security should be part of a broader security focus, and here a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/solutions\/layered-security\" target=\"_blank\" rel=\"noopener\">layered security approach<\/a>\u00a0is the best defense to help not only keep the bad guys out, but keep them from doing harm within your specific systems and sites.<\/p>\n<p>Layered security works on the basis that there are multiple ways attackers can get into a business, so you need multiple forms of defense to help protect your data. In your layers, you&#8217;ll want to include controls like email protection, web protection, firewalls, and endpoint protection to prevent widespread attacks.<\/p>\n<p>Should you fall victim to a DDoS attack, one of the biggest mistakes organizations can make is to create panic, both among themselves and their customers (or constituents). Remember that this attack may be annoying or even debilitating when it comes to service denial, but it is not the same as a breach against privacy or data. Remaining calm and using the appropriate descriptive language is important, and what\u2019s ultimately going to win the day. Otherwise you\u2019ve given the criminals exactly what they want and crave\u2014chaos.<\/p>\n<p><em>Tim Brown is VP of Security for SolarWinds MSP. He has over 20 years of experience developing and implementing security technology,\u00a0including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security. Tim\u2019s experience has made him an in-demand expert on cybersecurity, and has taken him from meeting with members of Congress and the Senate to the Situation Room in the White House. Additionally, Tim has been central in driving advancements in identity frameworks, has worked with the US government on security initiatives, and holds 18 patents on security-related topics.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While DDoS attacks are often unsophisticated, they can cause major disruption to services. Tim Brown looks at how to defend against them.<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5982","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DDoS\u2014What You Need to Know - N-able<\/title>\n<meta name=\"description\" content=\"While DDoS attacks are often unsophisticated, they can cause major disruption to services. Tim Brown looks at how to defend against them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS\u2014What You Need to Know - N-able\" \/>\n<meta property=\"og:description\" content=\"While DDoS attacks are often unsophisticated, they can cause major disruption to services. Tim Brown looks at how to defend against them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-29T19:21:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T13:03:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tim Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know\"},\"author\":{\"name\":\"Tim Brown\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\"},\"headline\":\"DDoS\u2014What You Need to Know\",\"datePublished\":\"2019-11-29T19:21:36+00:00\",\"dateModified\":\"2025-05-23T13:03:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know\"},\"wordCount\":893,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know\",\"name\":\"DDoS\u2014What You Need to Know - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2019-11-29T19:21:36+00:00\",\"dateModified\":\"2025-05-23T13:03:16+00:00\",\"description\":\"While DDoS attacks are often unsophisticated, they can cause major disruption to services. Tim Brown looks at how to defend against them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS\u2014What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\",\"name\":\"Tim Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"caption\":\"Tim Brown\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DDoS\u2014What You Need to Know - N-able","description":"While DDoS attacks are often unsophisticated, they can cause major disruption to services. Tim Brown looks at how to defend against them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know","og_locale":"de_DE","og_type":"article","og_title":"DDoS\u2014What You Need to Know - N-able","og_description":"While DDoS attacks are often unsophisticated, they can cause major disruption to services. Tim Brown looks at how to defend against them.","og_url":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-11-29T19:21:36+00:00","article_modified_time":"2025-05-23T13:03:16+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Tim Brown","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Tim Brown","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know"},"author":{"name":"Tim Brown","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8"},"headline":"DDoS\u2014What You Need to Know","datePublished":"2019-11-29T19:21:36+00:00","dateModified":"2025-05-23T13:03:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know"},"wordCount":893,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know","url":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know","name":"DDoS\u2014What You Need to Know - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2019-11-29T19:21:36+00:00","dateModified":"2025-05-23T13:03:16+00:00","description":"While DDoS attacks are often unsophisticated, they can cause major disruption to services. Tim Brown looks at how to defend against them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/ddos-what-you-need-know#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"DDoS\u2014What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8","name":"Tim Brown","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","caption":"Tim Brown"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5982"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5982\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}