Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    DDoS Attacks: What Can Enterprises Do to Combat Them?

    By
    Chris Preimesberger
    -
    May 21, 2013
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1DDoS Attacks: What Can Enterprises Do to Combat Them?

      1 - DDoS Attacks: What Can Enterprises Do to Combat Them?

      by Chris Preimesberger

      2August 1999: The First DDoS Attack

      2 - August 1999: The First DDoS Attack

      The world’s first DDoS attack, as noted by the SANS Institute, occurred in August 1999 when approximately 200 “zombie computers” flooded a computer at the University of Minnesota with excess traffic. Consequently, the attack affected hundreds of other systems, resulting in a nearly three-day computer outage at the school.

      3February 2000: DDoS Attacks Hit E-commerce Sites

      3 - February 2000: DDoS Attacks Hit E-commerce Sites

      Launched against Websites such as eBay, Amazon, Buy, Yahoo, CNN, ETrade and ZDNet, the motive for this high-profile DDoS attack was nothing more than extortion. Victims—in this case, the companies behind the Websites—were told to pay the attackers or suffer the consequences. This method continued as the status quo for six years.

      42006: DDoS Motives Diversify

      4 - 2006: DDoS Motives Diversify

      2006 marked the first time a DDoS attack was used for political motives. Hacking group Anonymous used the attacks as a method of protest. Reacting to news of an HIV-positive two-year-old being banned from an Alabama amusement park, the group broke into the virtual social networking site Habbo, which is based on a hotel setting. The group inserted numerous avatars (fake accounts) resembling black men in suits to block the virtual site’s pool, declaring it was “closed due to AIDS.”

      52008: DDoS Attacks Enter Traditional Warfare

      5 - 2008: DDoS Attacks Enter Traditional Warfare

      Before gunfight erupted between Russia and Georgia, Russian hackers dispersed a DDoS attack in Georgia’s Internet infrastructure, effectively disabling the government’s sites via the unsustainable amount of Web traffic. Bill Woodcock of the nonprofit Internet-traffic tracker Packet Clearing House told The New York Times that due to their low cost and anonymity, DDoS attacks “will almost certainly remain a feature of modern warfare.”

      62009: DDoS Attacks Spread, Slowloris Rears Its Head

      6 - 2009: DDoS Attacks Spread, Slowloris Rears Its Head

      By 2009, more hacking groups begin realizing the effectiveness and ease of DDoS attacks. This year also saw the arrival of “Slowloris,” a strategy aimed at disabling incoming requests. The tools required to create a Slowloris eventually became free, democratizing access to these methods of DDoS attacks.

      72009: Iranian Reformists Respond to Alleged Election Tampering

      7 - 2009: Iranian Reformists Respond to Alleged Election Tampering

      Iranian reformists disillusioned by the alleged rigging of the election exchanged scripts for launching DDoS attacks against President Mahmoud Ahmadinejad’s Website using social media. Iranians based in the U.K. also reportedly supported the DDoS attacks against Ahmadinejad by providing additional software for launching the attacks, which were successful in taking down the president’s and other government Websites. In a parallel activity, Anonymous, Pirate Bay and the Iranian Green Party launched a site called “Anonymous Iran” to help the protestors better communicate with each other and the outside world.

      82010: DDoS Becomes a Payback Mechanism

      8 - 2010: DDoS Becomes a Payback Mechanism

      WikiLeaks, a site which often exposes sensitive government documents, encounters “payback” in the form of DDoS attacks. Government agencies and activist groups who see WikiLeaks as a threat to diplomacy and security use DDoS attacks to shut down the site or freeze accounts and cut off ability for WikiLeaks to receive funding. The payback comes full circle, as those who shut down WikiLeaks themselves became the targets of DDoS attacks by hacktivists defending WikiLeaks.

      92011: DDoS Used as a Smokescreen

      9 - 2011: DDoS Used as a Smokescreen

      Sony security teams are distracted trying to defend against coordinated DDoS attacks, leaving no one to see network intrusions were simultaneously causing Sony PlayStation user accounts—101 million of them—to be breached.

      102011: LOIC Popularized by Anonymous and LulzSec

      10 - 2011: LOIC Popularized by Anonymous and LulzSec

      Low-Orbit Ion Cannon, or LOIC, was designed to stress-test networks, but once it became freeware, Anonymous popularized its use. It continues to grow, even though it reveals the IP address of the user. It’s rumored that a new version will mask a user’s IP address.

      112011-2012: Banks Feel the Brunt of DDoS

      11 - 2011-2012: Banks Feel the Brunt of DDoS

      In late 2011, hackers begin to go after bank Websites and corporate networks, including Bank of America, JPMorgan Chase and Citigroup. These attacks escalated in 2012, with Wells Fargo, PNC Bank, and others also becoming victims to DDoS attacks. Attacks continue today, and now U.S. government officials suspect Iranian hacktivists are carrying out many of them.

      122013: DDoS Used to Manipulate the Value of Virtual Currencies

      12 - 2013: DDoS Used to Manipulate the Value of Virtual Currencies

      In April 2013, DDoS attacks hit Mount Gox, suspending Bitcoin’s currency exchange for hours. The influx of attacks on virtual currencies causes industry experts to speculate whether DDoS is being used to cause market volatility—enough to quickly and easily turn a profit for those in control.

      PrevNext

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×