{"id":49876,"date":"2024-11-19T01:35:01","date_gmt":"2024-11-19T08:35:01","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=glossary&#038;p=49876"},"modified":"2024-11-19T03:01:29","modified_gmt":"2024-11-19T10:01:29","slug":"what-is-ddos","status":"publish","type":"glossary","link":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos","title":{"rendered":"What Is DDoS?"},"content":{"rendered":"\n<p>A distributed denial of service, or DDoS, attack is a common type of cybersecurity threat that can significantly disrupt networks, services, and even entire businesses. The potential impact ranges from minor interference to system failures, leading to financial and reputational consequences for your organization.<\/p>\n\n\n\n<p>In this post, we\u2019ll explore what a DDoS attack is,&nbsp; how it works, and different types of DDoS attacks. We\u2019ll clarify the meaning of DDoS in the context of modern cybersecurity and provide essential best practices for how to stop DDoS attacks.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">What is a DDoS attack?<\/h2>\n\n\n\n<p>A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal operation of a server, network, or service by overwhelming it with massive internet traffic.<\/p>\n\n\n\n<p>An example of a DDoS attack is sending too many requests to a web server causing the website to crash. Likewise, malicious actors can bombard a database with excessive search queries or data requests so that the database can\u2019t handle the volume, leading to slowdowns or crashes, which can also disrupt any applications or websites relying on it.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"mt-4\"><em>Thousands of DDoS attacks are now reported each day, and most are mitigated as a normal course of business with no special attention warranted. But cyber attackers are capable of increasing the scope of the attack \u2014 and DDoS attacks continue to rise in complexity, volume, and frequency. This presents a growing threat to the network security of even the smallest enterprises.<\/em><\/p>\n\n\n\n<p class=\"mb-4\">Gartner, <a href=\"https:\/\/www.gartner.com\/en\/topics\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">What is Cybersecurity<\/a><\/p>\n<\/blockquote>\n\n\n\n<p>Since DDoS attacks disrupt services that customers rely on, they pose a significant threat to your organization\u2019s reputation, customer satisfaction, and revenue. Therefore, it\u2019s important to take preventive measures against DDoS attacks.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How does a DDoS attack work?<\/h2>\n\n\n\n<p>The key principle behind DDoS attacks is to overload the internet bandwidth, CPU, and RAM capacity of targeted networks and services in order to make them inaccessible.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"540\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19011915\/figure-1-what-is-ddos.svg\" alt=\"Image - How DDoS attacks work\" class=\"wp-image-49884\"\/><\/figure>\n\n\n\n<p>Unlike simple denial of service (DoS) attacks, which come from one system, DDoS attacks leverage multiple systems or devices together. Cyber attackers access these systems by infecting various user devices with phishing attacks and other mass infection techniques. Called <em>a botnet<\/em>, these hundreds or thousands of bots await the malicious server\u2019s command.<\/p>\n\n\n\n<p>Once the command is given, the infected devices try to access the targeted resource all at once, overwhelming the system\u2019s technical capacity to respond to legitimate requests. The flood of traffic consumes bandwidth and system resources, causing the target system to slow down, become inaccessible, or crash altogether.<\/p>\n\n\n\n<p>It is extremely difficult \u2014 and frequently impossible \u2014 to filter out malicious traffic, as it usually comes from regular users\u2019 infected devices widely distributed across the internet.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Types of DDoS attacks<\/h2>\n\n\n\n<p>There are several types of DDoS attacks, most of which fall into four main categories based on the component of the network connection they target.<\/p>\n\n\n\n\t\t<div  class=\"block-f0b0c217-c181-4bb0-bff1-6c2f663162ff areoi-element container template-19 px-0 mb-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center text-26-22 p-poppins\" style=\"font-style:normal;font-weight:600\">Types of DDoS Attacks<\/p>\n\n\n\n\t\t<div  class=\"block-d09905f3-37a3-43b6-aeca-c578b0d13ccc row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5eefd52-a54d-43f4-aec3-c588eae9e2af col areoi-element ps-3 ps-md-0 ps-lg-3 col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5dcf9cb4-a50d-4935-817c-d526f996b1ee areoi-element rounded-bg-13px h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Volumetric attacks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6b819228-c007-4707-a8c6-91062bc58427 col areoi-element ps-3 ps-md-0 ps-lg-3 col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d213a66a-33fd-44cd-ac82-72d0e65f41fb areoi-element rounded-bg-13px h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Protocol attacks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b5eefd52-a54d-43f4-aec3-c588eae9e2af col areoi-element ps-3 ps-md-0 ps-lg-3 col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5dcf9cb4-a50d-4935-817c-d526f996b1ee areoi-element rounded-bg-13px h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Application layer attacks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6b819228-c007-4707-a8c6-91062bc58427 col areoi-element ps-3 ps-md-0 ps-lg-3 col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d213a66a-33fd-44cd-ac82-72d0e65f41fb areoi-element rounded-bg-13px h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0\" style=\"font-size:1.1rem;font-style:normal;font-weight:600\">Multi-vector attacks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Volumetric attacks<\/strong> (or volume-based attacks) aim to saturate the target\u2019s bandwidth and flood the network with large amounts of data.<\/li>\n<\/ul>\n\n\n\n<p>Examples of volumetric attacks include <a href=\"https:\/\/en.wikipedia.org\/wiki\/UDP_flood_attack\" target=\"_blank\" rel=\"noreferrer noopener\">UDP floods<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ping_flood\" target=\"_blank\" rel=\"noreferrer noopener\">ICMP floods<\/a>, and <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2013\/03\/29\/dns-amplification-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">DNS amplification<\/a>.<\/p>\n\n\n\n<p class=\"mb-5\">Volume-based DDoS attacks are measured in bits per second (bps).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protocol attacks <\/strong>consume all server resources and disrupt the system by targeting specific network protocols and exploiting different network vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<p>Protocol DDoS attack examples include <a href=\"https:\/\/en.wikipedia.org\/wiki\/SYN_flood\" target=\"_blank\" rel=\"noreferrer noopener\">SYN floods<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Smurf_attack\" target=\"_blank\" rel=\"noreferrer noopener\">Smurf DDoS attacks<\/a>, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/IP_fragmentation_attack\" target=\"_blank\" rel=\"noreferrer noopener\">IP fragmentation attacks<\/a>.<\/p>\n\n\n\n<p class=\"mb-5\">Protocol DDoS attacks are measured in packets per second (pps).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Application layer attacks <\/strong>(or resource layer attacks) target specific applications and services, overloading them with continuous requests until the server becomes unresponsive.<\/li>\n<\/ul>\n\n\n\n<p>Examples of application layer attacks include <a href=\"https:\/\/en.wikipedia.org\/wiki\/HTTP_Flood\" target=\"_blank\" rel=\"noreferrer noopener\">HTTP floods<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/DNS_Flood\" target=\"_blank\" rel=\"noreferrer noopener\">DNS query floods<\/a>, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Slowloris_(cyber_attack)\" target=\"_blank\" rel=\"noreferrer noopener\">Slowloris attacks<\/a>.<\/p>\n\n\n\n<p class=\"mb-5\">Application layer DDoS attacks are measured in requests per second (rps).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Multi-vector attacks<\/strong> combine multiple attack methods in a single attack. Multi-vector attacks are harder to defend against, as they might target different layers of the system all at once.<\/li>\n<\/ul>\n\n\n\n<p>If there are signs your network is under a DDoS attack, act fast, as hackers can make your organization vulnerable to other cyberattacks and threats.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How to prevent a DDoS attack<\/h2>\n\n\n\n<p>Preparing your organization ahead of time is key to prompt detection and response. To prevent a DDoS attack, consider the following best practices:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"mb-3\"><strong>Conduct a risk assessment.<\/strong> Regular risk assessments help you understand the vulnerabilities of your network\u2019s hardware and software.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Develop a denial-of-service defense strategy.<\/strong> Once the risks are identified, focus on the measures you need to take in order to promptly detect and prevent potential DDoS attacks.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Update software regularly. <\/strong>Frequent updates help you address network vulnerabilities and make sure protection software works properly.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Limit traffic rates.<\/strong> Reducing the number of requests that users and IP addresses can make within a certain time frame can help you significantly diminish the impact of bot traffic.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Identify your regular traffic patterns<\/strong>. Establishing baselines for regular traffic patterns will allow you to detect anomalies that may signal a DDoS attack early on.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Leverage a web application firewall (WAF).<\/strong> WAFs are effective against application layer attacks, as they analyze HTTP\/HTTPS requests and block suspicious traffic.<\/li>\n\n\n\n<li><strong>Implement a content delivery network (CDN).<\/strong> CDNs can absorb malicious traffic by balancing loads and distributing them between multiple servers globally.<\/li>\n<\/ul>\n\n\n\n<h2  class=\"wp-block-heading\">How to detect and mitigate a DDoS attack<\/h2>\n\n\n\n<p>Detecting a DDoS attack may be challenging as most malicious traffic is usually dispersed and blended into legitimate traffic. However, there are general signs that can help you spot a DDoS attack on your organization:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"mb-1\">Sudden sluggishness or unresponsiveness of your website or service<\/li>\n\n\n\n<li class=\"mb-1\">Frequent crashes of a server or application<\/li>\n\n\n\n<li class=\"mb-1\">Rapid spikes in bandwidth usage<\/li>\n\n\n\n<li class=\"mb-1\">Increased traffic from unexpected IP addresses<\/li>\n\n\n\n<li>High numbers of specific types of requests (like HTTP or DNS queries)<\/li>\n<\/ul>\n\n\n\n<p>Monitoring your traffic in real time, establishing network baselines, and leveraging automated traffic alerts can help you recognize these deviations and detect DDoS attacks early on.<\/p>\n\n\n\n<p>In the event of an attack, the following DDoS mitigation techniques will help you stop an assault or reduce its impact on your organization:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"mb-3\"><strong>Filter malicious traffic. <\/strong>Some<strong> <\/strong>intrusion prevention systems and advanced firewalls can help you block part of the attack by filtering out traffic from suspicious or malicious IP addresses.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Set rate limitations. <\/strong>Thresholding your traffic rates can help you reduce the amount of malicious traffic flowing through your network while keeping services available to real users.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Turn on backup servers.<\/strong> If you have spare servers, use them to distribute the load of a DDoS attack and reduce downtime.<\/li>\n\n\n\n<li class=\"mb-3\"><strong>Apply black hole routing. <\/strong>Creating a black hole route and streaming all traffic into that black hole may seem extreme, as it absorbs legitimate traffic as well. In some cases, however, it can prevent your service from crashing.<\/li>\n\n\n\n<li><strong>Use dedicated software.<\/strong> Anti-DDoS software and services specialize in mitigating these types of attacks, helping you detect and block malicious traffic effectively.<\/li>\n<\/ul>\n\n\n\n<p>To maximize the effectiveness of your DDoS protection efforts, it\u2019s vital to support them with other cybersecurity tools, processes, and services to help you fight other cyber threats.<\/p>\n\n\n\n<p class=\"mb-5\">Consider implementing <a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca<\/a> \u2013 a comprehensive cybersecurity platform. Syteca helps you secure your organization\u2019s inside perimeter by <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">monitoring user activity in real time<\/a>, <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">proactively managing employee access<\/a>, and <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">automatically responding to security events<\/a>.<\/p>\n\n\n\n\t\t<div  class=\"block-45bdec9f-2608-4a66-87f4-70c46e8b6d40 areoi-element container pattern-request-demo-2 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 235,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-9a85f780-fb8d-4582-8697-2574d7c899f7 row areoi-element align-items-center row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e962fe6-f77f-40f9-898c-abaef3f48ccb col areoi-element d-flex flex-wrap flex-column align-items-center align-items-md-start col-md-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left p-poppins pt-3 text-center text-md-start lh-sm has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Want to try Syteca? Request access<br>to the online demo!<\/p>\n\n\n\n<p class=\"has-text-align-left p-poppins pb-3 text-center text-md-start\" style=\"font-style:normal;font-weight:500\">See why clients from 70+ countries already use Syteca.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-9170fdac-8fec-4c73-a86c-338093dbf9d9 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f840f051-f300-4ade-9e70-68d6c65e619d col areoi-element col-md-6 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"369\" height=\"248\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png\" alt=\"\" class=\"wp-image-24868\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png 369w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584-300x202.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":49891,"menu_order":0,"template":"","class_list":["post-49876","glossary","type-glossary","status-publish","has-post-thumbnail","hentry","glossary_category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is DDoS? | Syteca<\/title>\n<meta name=\"description\" content=\"What is DDoS? \u2705 Learn the definition of \u201cdistributed denial-of-service attack\u201d, various DDoS attack types, and ways to safeguard your organization for ultimate DDoS protection and IT compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is DDoS? | Syteca\" \/>\n<meta property=\"og:description\" content=\"What is DDoS? \u2705 Learn the definition of \u201cdistributed denial-of-service attack\u201d, various DDoS attack types, and ways to safeguard your organization for ultimate DDoS protection and IT compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-19T10:01:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013326\/OG-banner-what-is-ddos.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos\",\"url\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos\",\"name\":\"What Is DDoS? | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013259\/banner-what-is-ddos.png\",\"datePublished\":\"2024-11-19T08:35:01+00:00\",\"dateModified\":\"2024-11-19T10:01:29+00:00\",\"description\":\"What is DDoS? \u2705 Learn the definition of \u201cdistributed denial-of-service attack\u201d, various DDoS attack types, and ways to safeguard your organization for ultimate DDoS protection and IT compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013259\/banner-what-is-ddos.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013259\/banner-what-is-ddos.png\",\"width\":1920,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary-category\/security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is DDoS?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is DDoS? | Syteca","description":"What is DDoS? \u2705 Learn the definition of \u201cdistributed denial-of-service attack\u201d, various DDoS attack types, and ways to safeguard your organization for ultimate DDoS protection and IT compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos","og_locale":"en_US","og_type":"article","og_title":"What Is DDoS? | Syteca","og_description":"What is DDoS? \u2705 Learn the definition of \u201cdistributed denial-of-service attack\u201d, various DDoS attack types, and ways to safeguard your organization for ultimate DDoS protection and IT compliance.","og_url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos","og_site_name":"Syteca","article_modified_time":"2024-11-19T10:01:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013326\/OG-banner-what-is-ddos.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos","url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos","name":"What Is DDoS? | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013259\/banner-what-is-ddos.png","datePublished":"2024-11-19T08:35:01+00:00","dateModified":"2024-11-19T10:01:29+00:00","description":"What is DDoS? \u2705 Learn the definition of \u201cdistributed denial-of-service attack\u201d, various DDoS attack types, and ways to safeguard your organization for ultimate DDoS protection and IT compliance.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013259\/banner-what-is-ddos.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/19013259\/banner-what-is-ddos.png","width":1920,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-ddos#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.syteca.com\/en\/glossary"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.syteca.com\/en\/glossary-category\/security"},{"@type":"ListItem","position":3,"name":"What Is DDoS?"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary\/49876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/49891"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=49876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}