What is distributed denial of service (DDoS)?

This is a recommends products dialog
Top Suggestions
Starting at
View All >
Sign In / Create Account
language Selector,${0} is Selected
Register & Shop at Lenovo Pro
Register at Education Store

Pro Tier Benefits

• Save up to an extra 5% on Think everyday pricing
• Spend RM$25,000, advance to Plus Tier with increased benefits

Plus Tier Benefits

• Save up to an extra 8% on Think everyday pricing
• Spend RM$75,000, advance for free to Elite Tier with increased benefits
• Take advantage of flexible payment options with TruScale Device as a Service.

Elite Tier Benefits

• Save up to an extra 12% on Think everyday pricing
• Take advantage of flexible payment options with
TruScale Device as a Service.
Reseller Benefits
• Access to Lenovo's full product portfolio
• Configure and Purchase at prices better than Lenovo.com
View All Details >
more to reach
PRO Plus
PRO Elite
Congratulations, you have reached Elite Status!
Pro for Business
Delete icon Remove icon Add icon Reload icon
Temporary Unavailable
Cooming Soon!
. Additional units will be charged at the non-eCoupon price. Purchase additional now
We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is
Sign in or Create an Account to Save Your Cart!
Sign in or Create an Account to Join Rewards
View Cart
Wow, your cart is empty!
Fill it in with great deals
Some items in your cart are no longer available. Please visit cart for more details.
has been deleted
Please review your cart as items have changed.
Contains Add-ons
Proceed to checkout
Popular Searches
What are you looking for today ?
Quick Links
Recent Searches
Hamburger Menu
skip to main content

What is distributed denial of service (DDoS)?

DDoS is a type of cyberattack where multiple compromised computers are used to flood a target system or network with excessive traffic, rendering it unable to function properly. These attacks aim to disrupt the availability of the targeted service or website.

How does a DDoS attack work?

During a DDoS attack, many devices, usually infected with malware, are coordinated to send overwhelming traffic to a target. This flood of traffic overwhelms the target's resources, such as bandwidth or processing power, causing it to become unreachable or perform poorly.

What are the different types of DDoS attacks?

There are several types of DDoS attacks, including:

  • Volumetric attacks: These involve flooding the target with a massive amount of traffic, consuming its network resources.

  • Transmission control protocol/internet protocol (TCP/IP) attacks: These attacks exploit vulnerabilities in the TCP/IP protocol stack, exhausting system resources and disrupting connectivity.

  • Application layer attacks: These focus on exploiting weaknesses in specific applications or services, rendering them unreachable or unresponsive.

  • Domain name system (DNS) amplification attacks: In this type of attack, the attacker spoofs the source internet protocol (IP) address and sends numerous DNS queries to publicly accessible servers, amplifying the response to overwhelm the target.

Can a DDoS attack be stopped or prevented?

While it is challenging to completely prevent DDoS attacks, there are measures you can take to minimize their impact. Some preventive techniques include:

  • Network monitoring: Implementing robust network monitoring tools helps detect unusual traffic patterns and identify potential attacks early.

  • Traffic analysis: Analyzing network traffic patterns can help distinguish legitimate traffic from malicious traffic, allowing for better mitigation strategies.

  • Firewalls and intrusion prevention systems (IPS): Deploying firewalls and IPS can help detect and block suspicious traffic, reducing the risk of successful attacks.

  • Load balancing: Distributing traffic across multiple servers using load balancers can help absorb and mitigate DDoS attacks.

  • Content delivery networks (CDNs): Utilizing CDNs can help distribute traffic geographically and absorb DDoS attacks by leveraging their large-scale infrastructure.

How can you detect a DDoS attack?

Detecting a DDoS attack can be challenging, but there are signs you can look out for:

  • Unusually slow network or website performance: If your network or website becomes significantly slower or unresponsive, it could indicate a potential DDoS attack.

  • Unusual traffic patterns: Sudden spikes in incoming traffic or a significant increase in traffic from specific IP addresses can be indicative of a DDoS attack.

  • Unexpected service interruptions: If your services become intermittently unavailable or experience frequent disruptions, it may be due to a DDoS attack.

  • Unusual server resource consumption: Monitor your server's resource utilization. A sudden increase in central processing unit (CPU), memory, or bandwidth usage may be a sign of an ongoing attack.

Can a DDoS attack be traced back to the attacker?

Tracing DDoS attacks back to the original attacker can be quite challenging. Attackers often employ techniques to hide their identities, such as using botnets or anonymizing tools. However, with the help of advanced forensic analysis and cooperation between law enforcement agencies and internet service providers, it is possible to track down.

What are botnets and how are they used in DDoS attacks?

Botnets are networks of compromised computers or devices that are under the control of an attacker. These infected devices, called bots or zombies, can be used collectively to launch DDoS attacks. The attacker can remotely command the botnet to flood a target with traffic, amplifying the impact of the attack. Botnets are frequently used in DDoS attacks due to their ability to generate massive amounts of traffic from numerous sources.

Can cloud-based services help in mitigating DDoS attacks?

Yes, cloud-based services can play a crucial role in mitigating DDoS attacks. Cloud service providers often have robust infrastructure and specialized DDoS protection mechanisms in place. With their extensive network capacity, they can absorb and filter out malicious traffic before it reaches the target infrastructure. By leveraging cloud-based DDoS protection services, organizations can benefit from scalable, real-time attack detection and mitigation capabilities. Additionally, with the distributed nature of cloud-based services, they can better handle volumetric attacks and provide a high level of availability during an attack.

Can artificial intelligence (AI) be used to detect and mitigate DDoS attacks?

Yes, artificial intelligence (AI) has shown promising potential in detecting and mitigating DDoS attacks. AI-powered systems can analyze network traffic patterns, identify abnormal behavior, and differentiate between legitimate traffic and attack traffic. By leveraging machine learning algorithms, these systems can adapt and learn from new attack vectors, allowing for quicker and more accurate detection of DDoS attacks. Additionally, AI can help enhance automated response mechanisms, allowing for faster mitigation and reducing the reliance on manual intervention.

What is the role of network traffic analysis in mitigating DDoS attacks?

Network traffic analysis plays a vital role in mitigating DDoS attacks. By monitoring and analyzing incoming traffic, organizations can detect patterns and anomalies that indicate a potential attack. Advanced traffic analysis tools can identify abnormalities in packet size, protocol usage, or source IP addresses, enabling the identification of malicious traffic. With real-time analysis, organizations can swiftly implement mitigation strategies, such as traffic filtering or rate limiting, to minimize the impact of the attack.

How does rate limiting help in stopping DDoS attacks?

Rate limiting is an effective technique in stopping DDoS attacks by controlling the flow of incoming traffic. By setting thresholds for the number of requests allowed within a specific time frame, rate limiting restricts the volume of traffic that can reach the target network or server. This approach helps prevent overwhelming the system's resources and ensures that legitimate requests have a higher chance of being processed while illegitimate traffic is dropped. Implementing rate limits at various levels, such as at the firewall or load balancer, adds an additional layer of protection against DDoS attacks.

What is the importance of network redundancy in DDoS attack mitigation?

Network redundancy is vital in DDoS attack mitigation as it helps distribute traffic and minimize the impact on individual resources. By having redundant components, such as multiple servers, data centers, or network links, organizations can ensure that traffic can be redirected and shared among different resources. This prevents a single point of failure and reduces the risk of overload during a DDoS attack. Implementing network redundancy enables organizations to maintain service availability and provide uninterrupted access to users even in the face of DDoS attacks.

coming coming
Starting at
List Price
Est Value
Web Price:
List Price
Est Value (Estimated Value)
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Learn More
See More
See Less
View {0} Model
View {0} Models
Shipping options for {0}
Part Number:
See More
See Less
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
Add To Cart
Add To Cart
We're sorry,
Products are temporarily unavailable.
Continue Shopping
Learn More
Coming Soon
Featured Product
Featured Products
Oops! No results found. Visit the categories above to find your product.
open in new tab
© 2024 Lenovo. All rights reserved.
© {year} Lenovo. All rights reserved.
Compare  ()