{"id":284,"date":"2024-06-02T18:51:14","date_gmt":"2024-06-02T18:51:14","guid":{"rendered":"https:\/\/zalvis.com\/docs\/?p=284"},"modified":"2024-06-02T18:56:54","modified_gmt":"2024-06-02T18:56:54","slug":"what-is-a-ddos-attack","status":"publish","type":"post","link":"https:\/\/zalvis.com\/docs\/what-is-a-ddos-attack.html","title":{"rendered":"What Is A DDoS Attack?"},"content":{"rendered":"<p>Regrettably, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are common all over the Internet. Even with how common they are, most people don\u2019t know what actually constitutes a DDoS attack.\u00a0That said, what is a DDoS, or Distributed Denial of Service attack, how does it work, and how does it affect the intended target and its users?<\/p>\n<p>Keep reading and we\u2019ll explain!<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/zalvis.com\/docs\/what-is-a-ddos-attack.html\/#What_Is_A_DDoS_Attack\" >What Is A DDoS Attack?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/zalvis.com\/docs\/what-is-a-ddos-attack.html\/#What_Is_A_Denial_Of_Service\" >What Is A Denial Of Service?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/zalvis.com\/docs\/what-is-a-ddos-attack.html\/#What_Is_A_Distributed_Denial_Of_Service_Attack\" >What Is A Distributed Denial Of Service Attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/zalvis.com\/docs\/what-is-a-ddos-attack.html\/#Does_Zalvis_Offer_DDOS_Protection\" >Does Zalvis Offer DDOS Protection?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 id=\"what-is-a-ddos-attack\"><span class=\"ez-toc-section\" id=\"What_Is_A_DDoS_Attack\"><\/span>What Is A DDoS Attack?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 id=\"what-is-a-denial-of-service\"><span class=\"ez-toc-section\" id=\"What_Is_A_Denial_Of_Service\"><\/span>What Is A Denial Of Service?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Denial of Service is a very specific issue. To explain it simply, a website experiences DoS issues when it is no longer able to service its regular users. Most of the time, these issues happen without malicious intent. For example, a large website links to a small website, which isn\u2019t built for the same level of traffic (the Reddit effect). The small site can\u2019t handle the influx of traffic and therefore becomes unresponsive.<\/p>\n<p>Due to this, by adding the word \u201cattack\u201d, a Denial of Service Attack indicates malicious intent. The attacker is making a conscious effort using a DoS to create issues. The methods of doing this can vary greatly and a \u201cDoS attack\u201d is only referring to the expected result of the attack, not the way it is being executed. By consuming the server\u2019s resources, it can cause the server to become unavailable to its regular users, and in extreme cases, even crashing the server and taking it down entirely.<\/p>\n<p class=\"p1\"><b>Struggling with downtime issues? Zalvis is the hosting solution designed with reliability and security in mind! \u2714\ufe0f Check out our <\/b><a href=\"https:\/\/zalvis.com\/web-hosting\"><span class=\"s1\"><b>web hosting <\/b><\/span><\/a><b>plans!<\/b><\/p>\n<h3 id=\"what-is-a-distributed-denial-of-service-attack\"><span class=\"ez-toc-section\" id=\"What_Is_A_Distributed_Denial_Of_Service_Attack\"><\/span>What Is A Distributed Denial Of Service Attack?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-285\" src=\"https:\/\/zalvis.com\/docs\/wp-content\/uploads\/2024\/06\/IMG_8094.gif\" alt=\"Distributed Denial Of Service Attack\" width=\"980\" height=\"721\" \/><\/p>\n<p>The difference between Distributed Denial of Service attacks and regular Denial of Service attacks is the keyword, \u201cDistributed\u201d. A DoS attack is carried out by a single attacker using a single system, whereas a Distributed attack is carried out across multiple systems that are executing the attack.<\/p>\n<p>A Distributed Denial of Service attack requires multiple systems to carry out the attack, not multiple attackers. Commonly, large DDoS attacks are not executed through the attacker\u2019s own computer, but through a number of infected systems. Attackers can abuse a number of vulnerabilities to gain control over a large number of systems. The attacker then uses these compromised computers\/servers to mount an attack against its target.<\/p>\n<p>The website targeted by the DDoS attack is usually the only victim. But this isn\u2019t entirely accurate. Users with infected systems that are part of the attacking systems are similarly affected. Not only are their computers being used in illicit attacks, but their computer\u2019s and Internet connection\u2019s resources are also consumed by the attack that is being launched.<\/p>\n<p>There are a wide variety of methods that can be used to execute these attacks but, in the end, DDoS attacks have a singular purpose, keeping authentic users from using the target system.<\/p>\n<h3 id=\"does-chemicloud-offer-ddos-protection\"><span class=\"ez-toc-section\" id=\"Does_Zalvis_Offer_DDOS_Protection\"><\/span>Does Zalvis Offer DDOS Protection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, absolutely!<\/p>\n<p>Our network automatically detects and mitigates distributed denial-of-service attacks from large-volume intended to make your websites unavailable to legitimate users.<\/p>\n<p>We utilize real-time network protection, which detects, analyzes, and blocks attacks in real time. Attackers are blocked inline, then redistributed across the backbone of our network.<\/p>\n<p>Rules are automatically created using machine learning from traffic across our global network to intelligently reroute malicious traffic during this event.<\/p>\n<p>Our DDoS protection doesn\u2019t impact the latency of your site, it\u2019s happening inline, we\u2019re not routing your traffic to a third-party for protection.<\/p>\n<p>Additionally, we can protect your site from a range of DDoS attack methodologies including, UDP, SYN, HTTP floods, and more.<\/p>\n<p>This feature is always on, always running in the background to protect our customers.<\/p>\n<div class=\"pakrv69de72f916f8c\" >If you enjoyed this article, then you\u2019ll love Zalvis's Cloud Hosting platform. Turbocharge your website and get 24\/7 support from our veteran team. Our world-class hosting infrastructure focuses on auto-scaling, performance, and security. Let us show you the Zalvis difference! <a href=\"https:\/\/zalvis.com\/\">Check out our services.<\/a><\/div><style type=\"text\/css\">\r\n@media screen and (min-width: 1201px) {\r\n.pakrv69de72f916f8c {\r\ndisplay: block;\r\n}\r\n}\r\n@media screen and (min-width: 993px) and (max-width: 1200px) {\r\n.pakrv69de72f916f8c {\r\ndisplay: block;\r\n}\r\n}\r\n@media screen and (min-width: 769px) and (max-width: 992px) {\r\n.pakrv69de72f916f8c {\r\ndisplay: block;\r\n}\r\n}\r\n@media screen and (min-width: 768px) and (max-width: 768px) {\r\n.pakrv69de72f916f8c {\r\ndisplay: block;\r\n}\r\n}\r\n@media screen and (max-width: 767px) {\r\n.pakrv69de72f916f8c {\r\ndisplay: block;\r\n}\r\n}\r\n<\/style>\r\n","protected":false},"excerpt":{"rendered":"<p>Regrettably, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are common all over the Internet. Even with how common they are, most people don\u2019t know what actually constitutes a DDoS attack.\u00a0That said, what is a DDoS, or Distributed Denial of Service attack, how does it work, and how does it affect the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-284","post","type-post","status-publish","format-standard","hentry","category-support-faqs"],"_links":{"self":[{"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/posts\/284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":2,"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/posts\/284\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zalvis.com\/docs\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}