SlideShare a Scribd company logo
1 of 10
DDoS Boot Camp:
Basic Training for an Increasing Cyber Threat
www.prolexic.com
www.prolexic.com
DDoS Attacks Are Launched by Criminals,
Not Teenagers
• Data breaches and denial of service are
criminal-led, malicious acts
• Distributed denial of service (DDoS) attacks
are the most common and destructive form of
online hacking
• Organized cyber-attack groups launch
politically-motivated attacks to cause website
downtime
2
May 2013 www.prolexic.com
www.prolexic.com
Estimating the Cost of a DDoS Attack
• Financial services
companies lost an
estimated
US $17 million
per DDoS attack
in 2012, per Forrester
Consulting
3
www.prolexic.com
What Is a DDoS Denial of Service Attack?
• Attempt to make a computer resource unavailable to its
intended users
• Targeted systems include:
– Websites
– Email systems
– VOIP (phone systems)
– Network as a whole
• Hackers control remote botnets (robot networks) of virus-
infected computers
• It is difficult to identify the perpetrator
• Hacker techniques can further amplify the attack to
multiply the power of huge botnet
4
www.prolexic.com
DDoS Attack Types
5
• Not all attacks are the same
• Different techniques target different network
elements
• For example:
– Layer 3 and Layer 4 attacks target the network
infrastructure with huge volumes of traffic
– Layer 7 attacks target web applications. These
stealthy attacks resemble legitimate traffic to
overload the server
www.prolexic.com
Where Do DDoS Attacks Come From?
• Worldwide problem
• Almost every country is a source of DDoS attacks
• Many DDoS attacks originate from:
– Compromised servers at hosting providers that don’t
clean up malware
– Servers out of reach of international authorities
• China is the leading source of botnet activity
• The United States is the second leading source
6
www.prolexic.com
Why Do DDoS Attackers Strike?
• Hacktivisim and ideological and political
differences
• Extortion and other financial motivation
• Competitive attacks and hate crimes by
disgruntled employees or unhappy customers
• Hacker experimentation – novices trying to
make a name for themselves
• Download the white paper for more details
7
www.prolexic.com
DDoS Attackers Target Many Industries
• e-Commerce
• Education
• Energy
• Finance, banking and
insurance
• Government and
defense
• Healthcare
• Internet and telecom
• Media and
entertainment
• Non-profits
• Retail
• Technology
• Travel
8
www.prolexic.com
Download the Free White Paper
• Download the white paper DDoS Boot Camp: Basic
Training for an Increasing Cyber Threat at
http://www.prolexic.com/bootcamp.
• The white paper includes:
– What is DDoS
– Types of DDoS attacks and their relative popularity
– Insight into hacker mindsets and motives
– How different attacks target specific network weaknesses
– DDoS mitigation best practices for incident response and
business continuity
– A case study of successful DDoS attack readiness
9
www.prolexic.com
About Prolexic
• Prolexic Technologies is the world’s largest and
most trusted provider of DDoS protection and
mitigation services.
• Prolexic has successfully stopped DDoS attacks
for more than a decade.
• We can stop even the largest attacks that
exceed the capabilities of other DDoS
mitigation service providers.
10

More Related Content

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

D do s boot camp basic training for an increasing cyber threat

  • 1. DDoS Boot Camp: Basic Training for an Increasing Cyber Threat www.prolexic.com
  • 2. www.prolexic.com DDoS Attacks Are Launched by Criminals, Not Teenagers • Data breaches and denial of service are criminal-led, malicious acts • Distributed denial of service (DDoS) attacks are the most common and destructive form of online hacking • Organized cyber-attack groups launch politically-motivated attacks to cause website downtime 2 May 2013 www.prolexic.com
  • 3. www.prolexic.com Estimating the Cost of a DDoS Attack • Financial services companies lost an estimated US $17 million per DDoS attack in 2012, per Forrester Consulting 3
  • 4. www.prolexic.com What Is a DDoS Denial of Service Attack? • Attempt to make a computer resource unavailable to its intended users • Targeted systems include: – Websites – Email systems – VOIP (phone systems) – Network as a whole • Hackers control remote botnets (robot networks) of virus- infected computers • It is difficult to identify the perpetrator • Hacker techniques can further amplify the attack to multiply the power of huge botnet 4
  • 5. www.prolexic.com DDoS Attack Types 5 • Not all attacks are the same • Different techniques target different network elements • For example: – Layer 3 and Layer 4 attacks target the network infrastructure with huge volumes of traffic – Layer 7 attacks target web applications. These stealthy attacks resemble legitimate traffic to overload the server
  • 6. www.prolexic.com Where Do DDoS Attacks Come From? • Worldwide problem • Almost every country is a source of DDoS attacks • Many DDoS attacks originate from: – Compromised servers at hosting providers that don’t clean up malware – Servers out of reach of international authorities • China is the leading source of botnet activity • The United States is the second leading source 6
  • 7. www.prolexic.com Why Do DDoS Attackers Strike? • Hacktivisim and ideological and political differences • Extortion and other financial motivation • Competitive attacks and hate crimes by disgruntled employees or unhappy customers • Hacker experimentation – novices trying to make a name for themselves • Download the white paper for more details 7
  • 8. www.prolexic.com DDoS Attackers Target Many Industries • e-Commerce • Education • Energy • Finance, banking and insurance • Government and defense • Healthcare • Internet and telecom • Media and entertainment • Non-profits • Retail • Technology • Travel 8
  • 9. www.prolexic.com Download the Free White Paper • Download the white paper DDoS Boot Camp: Basic Training for an Increasing Cyber Threat at http://www.prolexic.com/bootcamp. • The white paper includes: – What is DDoS – Types of DDoS attacks and their relative popularity – Insight into hacker mindsets and motives – How different attacks target specific network weaknesses – DDoS mitigation best practices for incident response and business continuity – A case study of successful DDoS attack readiness 9
  • 10. www.prolexic.com About Prolexic • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. • Prolexic has successfully stopped DDoS attacks for more than a decade. • We can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers. 10