{"id":33875,"date":"2023-09-10T12:24:56","date_gmt":"2023-09-10T12:24:56","guid":{"rendered":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?p=33875"},"modified":"2023-09-10T12:24:57","modified_gmt":"2023-09-10T12:24:57","slug":"whats-a-ddos-attack-definition-and-examples","status":"publish","type":"post","link":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/","title":{"rendered":"What&#8217;s a DDoS Attack? Definition and Examples"},"content":{"rendered":"<p><\/p>\n<div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\">\n<pre><\/pre>\n<p><iframe loading=\"lazy\" title=\"What is DDoSing? DDoS Attacks Defined\" width=\"1020\" height=\"574\" src=\"https:\/\/www.youtube.com\/embed\/NjuEtfs_zqE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\"><strong>A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services.<\/strong> A DDoS attack goals to render your services unresponsive by overwhelming your systems with illegitimate requests.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Increasingly businesses and site owners are asking themselves, <em>what&#8217;s DDoS<\/em>? They\u2019ve seen other corporations fall prey to a cyberattack and need to know the way to prevent it from happening to them.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">In February 2020, <a href=\"https:\/\/www.zdnet.com\/article\/aws-said-it-mitigated-a-2-3-tbps-ddos-attack-the-largest-ever\/#:~:text=Amazon%20said,Shield%20staff\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon Web Services was hit by a large DDoS attack<\/a> that lasted almost three days, also impacting countless other publishers and site owners that depend on AWS. The targeted IP address saw a rise of 56-70 times the quantity of information normally sent.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">In 2018, <a href=\"https:\/\/github.blog\/2018-03-01-ddos-incident-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub was hit with the biggest DDoS attack<\/a> recorded at the moment. Despite flooding GitHub\u2019s servers with 1.3 terabytes per second (Tbps) of information and 126.9 packets per second (Pps), the attack only took GitHub offline for 20 minutes on account of Github\u2019s strong DDoS protection measures.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">This highly variable level of efficacy and risk shows that corporations must prioritize mitigating damage from potential DDoS attacks. These cyberattacks are only growing as more traffic comes online and sensitive data and services proceed to carry value.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">On this post, we\u2019ll cover the next areas along the lines of <em>what&#8217;s DDoS<\/em>:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li>What&#8217;s DDoSing?<\/li>\n<li>How will you <strong>detect an attack<\/strong>?<\/li>\n<li>What are some <strong>examples of DDoS<\/strong> attacks?<\/li>\n<li>What are the <strong>differing kinds<\/strong> of attacks?<\/li>\n<li>How do I <strong>protect<\/strong> against these attacks?<\/li>\n<\/ul>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Perhaps a very powerful aspect of protection against DDoS is early detection. In case your organization can discover the DDoS attack early on, you&#8217;ll be able to take steps to mitigate the damage, limit traffic, and improve security going forward.<\/p>\n<\/div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full lw-drop-shadow\"><\/figure>\n<\/div>\n<\/div>\n<h2 id=\"h-how-to-detect-a-ddos-attack\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Easy methods to Detect a DDoS Attack<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">So, what&#8217;s DDoSing, and how will you detect it?<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">A DDoS is what happens when your <strong>servers, website, applications, infrastructure, or other assets are flooded with requests<\/strong> from malicious actors attempting to bring down or take your services offline. While security measures vary across hosting solutions, even essentially the most hardened <a href=\"https:\/\/www.liquidweb.com\/products\/dedicated\/\">dedicated server hosting<\/a> should still be vulnerable to a DDoS attack.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">It might be difficult to find out when a DDoS attack is happening versus a legitimate failure of service. DDoS attacks can often appear as legitimate traffic or downed servers. With a purpose to discover an attack with certainty, further investigation with analytics tools may also help spot among the <strong>signs of DDoS<\/strong>:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li>A <strong>suspicious spike in requests<\/strong> to a single page.<\/li>\n<li><strong>Downed applications or servers<\/strong> with out a history of compromise.<\/li>\n<li>Large amounts of <strong>traffic from one single IP address<\/strong> or a spread of IP addresses.<\/li>\n<li>Traffic coming from <strong>users with similar characteristics<\/strong>.<\/li>\n<li><a href=\"https:\/\/www.liquidweb.com\/blog\/traffic-spikes\/\">Spikes in traffic<\/a> patterns at odd hours or otherwise <strong>non-typical traffic patterns<\/strong> for what you are promoting or site.<\/li>\n<\/ul>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Detecting DDoS can be about awareness and ensuring you\u2019re conversant in some examples of attacks. Let\u2019s break down several kinds of DDoS attacks to indicate how DDoS protection does work.<\/p>\n<\/div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full lw-drop-shadow\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2021\/07\/how-to-protect-against-a-hacker-and-DDoS-attack.jpg\" alt=\"how to protect against a hacker and DDoS attack\" class=\"wp-image-232368\" loading=\"lazy\"><\/figure>\n<\/div>\n<\/div>\n<h2 id=\"h-examples-of-ddos-attacks\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Examples of DDoS Attacks<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">What&#8217;s DDoS in the true world? We already mentioned among the high-profile attacks on Amazon and GitHub. These real-world examples may give us a greater idea of what\u2019s trending amongst cybercriminals and the way we will bolster DDoS protection in the longer term.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">One among the primary recorded DDoS attacks occurred in 2000 when <a href=\"https:\/\/www.npr.org\/sections\/alltechconsidered\/2015\/02\/07\/384567322\/meet-mafiaboy-the-bratty-kid-who-took-down-the-internet#:~:text=in%202000%2C%20a%20high%20school%20student%20named%20michael%20calce%2C%20who%20went%20by%20the%20online%20handle%20mafiaboy%2C%20brought%20down%20the%20websites%20of%20amazon%2C%20cnn%2C%20dell%2C%20e*trade%2C%20ebay%2C%20and%20yahoo!.%20at%20the%20time%2C%20yahoo!%20was%20the%20biggest%20search%20engine%20in%20the%20world.\" target=\"_blank\" rel=\"noreferrer noopener\">a teenage hacker by the pseudonym \u201cMafiaBoy<\/a>\u201d was capable of flood a lot of universities and businesses with overwhelming traffic. It\u2019s fair to say that DDoS has evolved exponentially since that point, and it\u2019s still affecting major industries today.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Only months after the February 2020 cyberattack against AWS, <a href=\"https:\/\/www.securitymagazine.com\/articles\/94570-ddos-attacks-intensify-driven-in-part-by-covid-19-and-5g\" target=\"_blank\" rel=\"noreferrer noopener\">Google revealed details of a DDoS attack<\/a> targeting their services and registering even higher at 2.6 Tbps. Firms of all sizes are in danger from this growing cyber threat.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">DDoS attacks may be categorized into three foremost groups based on what layer of service they aim: volumetric attacks, protocol attacks, and application attacks. Let\u2019s examine each and understand how they could affect a site with <a href=\"https:\/\/www.liquidweb.com\/blog\/vps-ddos-protection\/\">VPS DDoS protection<\/a>.<\/p>\n<\/div>\n<h3 id=\"h-volumetric-attacks\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Volumetric Attacks<\/strong><\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Volumetric attacks are perpetrated when <strong>massive quantities of illegitimate traffic overwhelm your server<\/strong>, website, or other resources. Also often known as volume-based attacks, volumetric attacks are measured in bits per second (BPS). Several kinds of volumetric attacks include User Datagram Protocol (UDP), Web Control Message Protocol (ICMP), and junk flood attacks.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">So simply put, what&#8217;s a DDoS attack when it&#8217;s volume-based? Volumetric attacks are like a traffic jam. Imagine going to work and pulling onto the on-ramp only to see that each lane on the highway is bumper-to-bumper with cars. You\u2019re stuck and might\u2019t get access to the road. Unlike a traffic jam, nevertheless, traffic doesn\u2019t just wait in line. Users will see the dreaded \u201cNo Connection Error,\u201d or the load times will slow to the purpose of causing frustration, causing users to desert their original request.<\/p>\n<\/div>\n<h3 id=\"h-protocol-attacks\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Protocol Attacks<\/strong><\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Protocol attacks occur when your <strong>infrastructure, or parts of your infrastructure, is flooded with excessive numbers of packets<\/strong>. Also often known as network-layer attacks, protocol DDoS attacks are measured in packets per second (Pps). Several types of protocol attacks include Smurf DDoS, TCP Connection Attacks, or TCP SYN Floods.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">SYN Floods (also often known as TCP Connection Attacks) goal what\u2019s called a three-way handshake connection. This common TCP connection point is the vulnerability the attack exploits.<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">During an SYN Flood, a \u201chandshake\u201d request is shipped to a targeted server, nevertheless it\u2019s never accomplished. The targeted port is then unavailable to reply to any requests. The attack spreads from there as an increasing number of requests are sent until servers go down.<\/p>\n<\/div>\n<h3 id=\"h-application-layer-attacks\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Application-Layer Attacks<\/strong><\/h3>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">A solution to \u2013 What&#8217;s DDoS? \u2013 wouldn\u2019t be complete with out a take a look at the attacks\u2019 effects on applications. Application-layer attacks <strong>overwhelm applications with malicious requests<\/strong>, affecting the layer of service where web pages are generated, and HTTP requests are made. These application DDoS attacks are measured in requests per second (RPS).<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Application-layer attacks are inclined to advance in a slower fashion than traditional volumetric attacks. This slower rate allows the requests to look legitimate until they&#8217;ve sufficiently overwhelmed an application.\u00a0<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">It\u2019s necessary to keep in mind that these <strong>several types of attacks often work in tandem<\/strong> with one another. It\u2019s rare that a cybercriminal will focus all their efforts on one endpoint. For instance, an initial application-layer attack could also be followed by a volumetric attack. Site owners must play defense on all endpoints to make sure the detection of every style of DDoS attack.<\/p>\n<\/div>\n<h2 id=\"h-how-to-protect-against-a-ddos-attack\" class=\"Heading__SHeading-sc-o0nhd6-0\"><strong>Easy methods to Protect Against a DDoS Attack<\/strong><\/h2>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">Up to now, we\u2019ve answered \u2013 what&#8217;s a DDoS Attack? And we\u2019ve checked out several types of attacks and detection. But how does DDoS protection work?<\/p>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\">In terms of protecting your server from a possible DDoS attack, it\u2019s necessary to be vigilant from a proactive perspective. Some useful concepts to think about within the realm of DDoS protection include:<\/p>\n<\/div>\n<div data-lw-block-type=\"list\" data-lw-block-attributes=\"\">\n<ul class=\"list-disc list-outside\">\n<li><strong>Learn Your Traffic Patterns: <\/strong>With help from network and server monitoring tools, you have to get a way of your typical inbound traffic. When it spikes sharply or is clocking way above the conventional range, you&#8217;ll be able to take the suitable measures. It\u2019s value mentioning that it is best to also monitor activity during an attack to assist decipher the reasoning behind the attack.<\/li>\n<li><strong>Higher to Be Secure than Sorry: <\/strong>Along with mitigation tools and over-provisioning bandwidth, think about using an <a href=\"https:\/\/www.liquidweb.com\/kb\/intrusion-detection-system\/\">Intrusion Detection System (IDS)<\/a> and an Intrusion Protection System (IPS) for early attack detection, filters to dam packets from the same old suspects, dropping all malformed\/spoofed packets, and lowering your thresholds to your SYN, ICMP, and UDP Flood drops.<\/li>\n<li><strong>DDoS Mitigation Tools Are a Must: <\/strong>For big or particularly complex DDoS attacks, mitigation platforms and appliances are sometimes equipped with a robust infrastructure and advanced detection and monitoring technology. You\u2019ll make things much easier on yourself and be thankful you probably did when a hypothetical attack becomes real.\u00a0<\/li>\n<\/ul>\n<\/div>\n<div data-lw-block-type=\"paragraph\" data-lw-block-attributes=\"\">\n<p class=\"Paragraph__SParagraph-sc-1p2ggqg-0\"><a href=\"https:\/\/www.liquidweb.com\/products\/add-ons\/ddos-protection-services\/\">Liquid Web\u2019s DDoS Protection Services<\/a> may also help your site stay protected against cyberattacks that would cost you data and resources. Stay ahead of the growing trend of DDoS attack prevalence with managed hosting solutions from Liquid Web.<\/p>\n<\/div>\n<div data-lw-block-type=\"html\" data-lw-block-attributes=\"\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large lw-drop-shadow\"><a href=\"https:\/\/hub.liquidweb.com\/ebooks\/liquid-web-smb-cybersecurity-checklist\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2018\/07\/eBook-SMB-Security-Checklist.jpg\" alt=\"eBook - SMB Security Checklist\" class=\"wp-image-63533\" loading=\"lazy\"><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services. A DDoS attack goals to render your services unresponsive by overwhelming your systems with illegitimate requests. Increasingly businesses and site owners are asking themselves, what&#8217;s DDoS? They\u2019ve seen other corporations fall [&#8230;]\n","protected":false},"author":1,"featured_media":33876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"fifu_image_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg","fifu_image_alt":"","two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[97],"tags":[3359,3358,3245,1321],"class_list":["post-33875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-attack","tag-ddos","tag-definition","tag-examples"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What&#039;s a DDoS Attack? Definition and Examples - Daniels Marketing BLC<\/title>\n<meta name=\"description\" content=\"A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s a DDoS Attack? Definition and Examples - Daniels Marketing BLC\" \/>\n<meta property=\"og:description\" content=\"A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/\" \/>\n<meta property=\"og:site_name\" content=\"Daniels Marketing BLC\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-10T12:24:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-10T12:24:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg\" \/>\n<meta name=\"author\" content=\"info\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"info\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/\"},\"author\":{\"name\":\"info\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"headline\":\"What&#8217;s a DDoS Attack? Definition and Examples\",\"datePublished\":\"2023-09-10T12:24:56+00:00\",\"dateModified\":\"2023-09-10T12:24:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/\"},\"wordCount\":1406,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/06\\\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg\",\"keywords\":[\"Attack\",\"DDoS\",\"Definition\",\"Examples\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/\",\"name\":\"What's a DDoS Attack? Definition and Examples - Daniels Marketing BLC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/06\\\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg\",\"datePublished\":\"2023-09-10T12:24:56+00:00\",\"dateModified\":\"2023-09-10T12:24:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\"},\"description\":\"A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/06\\\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/lwgatsby\\\/f_auto\\\/www\\\/uploads\\\/2022\\\/06\\\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/2023\\\/09\\\/10\\\/whats-a-ddos-attack-definition-and-examples\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s a DDoS Attack? Definition and Examples\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#website\",\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/\",\"name\":\"Daniels Marketing BLC\",\"description\":\"All About Health &amp; Marketing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/#\\\/schema\\\/person\\\/6a0a5d2e1a48d29297b62e635a4db33f\",\"name\":\"info\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g\",\"caption\":\"info\"},\"url\":\"https:\\\/\\\/danielsmarketingblc.com\\\/CuratedProducts\\\/author\\\/info\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What's a DDoS Attack? Definition and Examples - Daniels Marketing BLC","description":"A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/","og_locale":"en_US","og_type":"article","og_title":"What's a DDoS Attack? Definition and Examples - Daniels Marketing BLC","og_description":"A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services.","og_url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/","og_site_name":"Daniels Marketing BLC","article_published_time":"2023-09-10T12:24:56+00:00","article_modified_time":"2023-09-10T12:24:57+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg","type":"","width":"","height":""}],"author":"info","twitter_card":"summary_large_image","twitter_image":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg","twitter_misc":{"Written by":"info","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#article","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/"},"author":{"name":"info","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"headline":"What&#8217;s a DDoS Attack? Definition and Examples","datePublished":"2023-09-10T12:24:56+00:00","dateModified":"2023-09-10T12:24:57+00:00","mainEntityOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/"},"wordCount":1406,"commentCount":0,"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg","keywords":["Attack","DDoS","Definition","Examples"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/","name":"What's a DDoS Attack? Definition and Examples - Daniels Marketing BLC","isPartOf":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website"},"primaryImageOfPage":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#primaryimage"},"image":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg","datePublished":"2023-09-10T12:24:56+00:00","dateModified":"2023-09-10T12:24:57+00:00","author":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f"},"description":"A Distributed Denial of Service (DDoS) attack is a cyberattack, sourced from a distributed network, that goals to disclaim responses out of your services.","breadcrumb":{"@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#primaryimage","url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg","contentUrl":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/2023\/09\/10\/whats-a-ddos-attack-definition-and-examples\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s a DDoS Attack? Definition and Examples"}]},{"@type":"WebSite","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#website","url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/","name":"Daniels Marketing BLC","description":"All About Health &amp; Marketing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/#\/schema\/person\/6a0a5d2e1a48d29297b62e635a4db33f","name":"info","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/387c3341fa426df253347bf8f03bf81e7c8355f511b0ffdb256b6fad73bc149c?s=96&d=mm&r=g","caption":"info"},"url":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/author\/info\/"}]}},"jetpack_featured_media_url":"https:\/\/res.cloudinary.com\/lwgatsby\/f_auto\/www\/uploads\/2022\/06\/What-is-a-DDoS-Attack-Definition-and-Examples-social-tile.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/33875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/comments?post=33875"}],"version-history":[{"count":2,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/33875\/revisions"}],"predecessor-version":[{"id":33878,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/posts\/33875\/revisions\/33878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media\/33876"}],"wp:attachment":[{"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/media?parent=33875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/categories?post=33875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danielsmarketingblc.com\/CuratedProducts\/wp-json\/wp\/v2\/tags?post=33875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}