Page 50 - Cyber Warnings
P. 50
Understanding the 5 Common Motives for Today’s DDoS Cyber
Attacks can help Companies in UAE Prevent them!
By Chris Gale, EMEA Partner Director at A10 Networks
Distributed denial-of-service (DDoS) attacks continue to be one of the most prevalent methods
hackers use to disrupt businesses. Involving the use of multiple systems (personal computers,
smartphones, etc.), DDoS attacks overload an organization's network by generating web traffic
that can't be accommodated by the system's capacity limits.
Unlike with other forms of cyber attacks, DDoS attackers run the gamut in terms of their
technical prowess. With DDoS services available for purchase online, even the least tech-savvy
teenager with a credit card is capable of taking down company web assets for hours and even
days.
Due to the diversity amongst those carrying out DDoS attacks, ranging from high-school kids to
state-sponsored hackers, the purpose behind separate incidents can vary significantly.
For example, while an experienced cyber criminal may use a DDoS attack for diversionary
purposes, a disgruntled employee may carry out an attack just for the sake of causing chaos.
Chris Gale, EMEA Partner Director at A10 Networks at A10 Networks has mapped out some of
the most common motives for these attacks and describes the tell-tale signs that will help
companies in UAE combat these cyber attacks:
Hit-and-Run
The least sophisticated form of DDoS is the hit-and-run attack. These come in a wide variety,
targeting gaming services, consumer websites and various other high-visibility targets.
These attacks aren't typically very strategic and are commonly executed by hackers causing
chaos for attention or young cyber criminals testing their chops.
Considering these attacks are typically the least organized, and pulled off by the least technical
individuals, they are the easiest to prevent. Unskilled troublemakers typically will use a paid
service to pull off the attacks, making it costly to sustain long-term.
By optimizing your network configuration, and utilizing technology with robust load balancing
capabilities, the risks posed by these attacks are greatly minimized.
50 Cyber Warnings E-Magazine – June 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide