Strategies To Fight Anonymous DDoS Attacks

Against the backdrop of the fact that distributed denial-of-service (DDoS) attacks went mainstream in 2011, security vendor Radware has stated in its new Monday-released report that it is chiefly the Anonymous hacking group which popularized DDoS attacks with its widespread distribution of easy-to-use DDoS tools like low-orbit ion cannon.

With the report noting that the “turning point” which shaped the security scenario last year was essentially the ‘Operation Payback’ campaign during the 2010 WikiLeaks episode, it has become extremely important for businesses and government agencies to take necessary measure to defy DDoS attacks.

In order to plan their strategies to fight DDoS attacks and to lessen the impact of DDoS attacks on their websites, servers, databases, and other essential infrastructure, business and government agencies should remember that all sites are ‘vulnerable’ to such attacks; adequate beforehand planning to avert the risk of the attacks; and that DDoS attacks, though cheap to launch, are difficult to stop.

DDoS attacks can also be prevented by organizations by securing potential bottlenecks; actively monitoring the network; and looking beyond the seemingly large attacks, especially since Radware statistics show that 76 percent of the 40 DDoS attacks in 2011 involved less than 1Gbps of bandwidth.

Furthermore, revealing that most of the sub-1Gbps target organizations were “targeted with a mix of network and application flood attacks,” the Radware report – highlighting the need for detecting ‘blended’ attacks – said: “Attackers are often likely to combine both packet flooding attacks with application-layer DDoS, to increase their odds of success.”