Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    DDoS Attacks: What Can Enterprises Do to Combat Them?

    By
    Chris Preimesberger
    -
    May 21, 2013
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1DDoS Attacks: What Can Enterprises Do to Combat Them?

      1 - DDoS Attacks: What Can Enterprises Do to Combat Them?

      by Chris Preimesberger

      2August 1999: The First DDoS Attack

      2 - August 1999: The First DDoS Attack

      The world’s first DDoS attack, as noted by the SANS Institute, occurred in August 1999 when approximately 200 “zombie computers” flooded a computer at the University of Minnesota with excess traffic. Consequently, the attack affected hundreds of other systems, resulting in a nearly three-day computer outage at the school.

      3February 2000: DDoS Attacks Hit E-commerce Sites

      3 - February 2000: DDoS Attacks Hit E-commerce Sites

      Launched against Websites such as eBay, Amazon, Buy, Yahoo, CNN, ETrade and ZDNet, the motive for this high-profile DDoS attack was nothing more than extortion. Victims—in this case, the companies behind the Websites—were told to pay the attackers or suffer the consequences. This method continued as the status quo for six years.

      42006: DDoS Motives Diversify

      4 - 2006: DDoS Motives Diversify

      2006 marked the first time a DDoS attack was used for political motives. Hacking group Anonymous used the attacks as a method of protest. Reacting to news of an HIV-positive two-year-old being banned from an Alabama amusement park, the group broke into the virtual social networking site Habbo, which is based on a hotel setting. The group inserted numerous avatars (fake accounts) resembling black men in suits to block the virtual site’s pool, declaring it was “closed due to AIDS.”

      52008: DDoS Attacks Enter Traditional Warfare

      5 - 2008: DDoS Attacks Enter Traditional Warfare

      Before gunfight erupted between Russia and Georgia, Russian hackers dispersed a DDoS attack in Georgia’s Internet infrastructure, effectively disabling the government’s sites via the unsustainable amount of Web traffic. Bill Woodcock of the nonprofit Internet-traffic tracker Packet Clearing House told The New York Times that due to their low cost and anonymity, DDoS attacks “will almost certainly remain a feature of modern warfare.”

      62009: DDoS Attacks Spread, Slowloris Rears Its Head

      6 - 2009: DDoS Attacks Spread, Slowloris Rears Its Head

      By 2009, more hacking groups begin realizing the effectiveness and ease of DDoS attacks. This year also saw the arrival of “Slowloris,” a strategy aimed at disabling incoming requests. The tools required to create a Slowloris eventually became free, democratizing access to these methods of DDoS attacks.

      72009: Iranian Reformists Respond to Alleged Election Tampering

      7 - 2009: Iranian Reformists Respond to Alleged Election Tampering

      Iranian reformists disillusioned by the alleged rigging of the election exchanged scripts for launching DDoS attacks against President Mahmoud Ahmadinejad’s Website using social media. Iranians based in the U.K. also reportedly supported the DDoS attacks against Ahmadinejad by providing additional software for launching the attacks, which were successful in taking down the president’s and other government Websites. In a parallel activity, Anonymous, Pirate Bay and the Iranian Green Party launched a site called “Anonymous Iran” to help the protestors better communicate with each other and the outside world.

      82010: DDoS Becomes a Payback Mechanism

      8 - 2010: DDoS Becomes a Payback Mechanism

      WikiLeaks, a site which often exposes sensitive government documents, encounters “payback” in the form of DDoS attacks. Government agencies and activist groups who see WikiLeaks as a threat to diplomacy and security use DDoS attacks to shut down the site or freeze accounts and cut off ability for WikiLeaks to receive funding. The payback comes full circle, as those who shut down WikiLeaks themselves became the targets of DDoS attacks by hacktivists defending WikiLeaks.

      92011: DDoS Used as a Smokescreen

      9 - 2011: DDoS Used as a Smokescreen

      Sony security teams are distracted trying to defend against coordinated DDoS attacks, leaving no one to see network intrusions were simultaneously causing Sony PlayStation user accounts—101 million of them—to be breached.

      102011: LOIC Popularized by Anonymous and LulzSec

      10 - 2011: LOIC Popularized by Anonymous and LulzSec

      Low-Orbit Ion Cannon, or LOIC, was designed to stress-test networks, but once it became freeware, Anonymous popularized its use. It continues to grow, even though it reveals the IP address of the user. It’s rumored that a new version will mask a user’s IP address.

      112011-2012: Banks Feel the Brunt of DDoS

      11 - 2011-2012: Banks Feel the Brunt of DDoS

      In late 2011, hackers begin to go after bank Websites and corporate networks, including Bank of America, JPMorgan Chase and Citigroup. These attacks escalated in 2012, with Wells Fargo, PNC Bank, and others also becoming victims to DDoS attacks. Attacks continue today, and now U.S. government officials suspect Iranian hacktivists are carrying out many of them.

      122013: DDoS Used to Manipulate the Value of Virtual Currencies

      12 - 2013: DDoS Used to Manipulate the Value of Virtual Currencies

      In April 2013, DDoS attacks hit Mount Gox, suspending Bitcoin’s currency exchange for hours. The influx of attacks on virtual currencies causes industry experts to speculate whether DDoS is being used to cause market volatility—enough to quickly and easily turn a profit for those in control.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×