Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly
This article explains what DDoS attacks are, highlights famous large‑scale incidents, examines their financial and reputational impact on businesses, and outlines practical mitigation strategies that cloud providers and organizations can adopt to detect and survive such attacks.
What is DDoS?
DDoS (Distributed Denial of Service) attacks use multiple compromised computers as a platform to flood one or more targets with massive amounts of legitimate‑looking traffic, exhausting network resources and rendering services unavailable.
Notable DDoS Incidents
March 2013: Spamhaus and CloudFlare suffered a record 300 Gbps attack that nearly crippled European networks.
February 2014: A 400 Gbps attack hit CloudFlare customers, affecting roughly 785 000 sites including 4chan and WikiLeaks.
March 2014: Anonymous launched a massive attack on Sony’s PlayStation Network, causing service outage and data theft of 77 million users.
December 2014: A Chinese gaming company on Alibaba Cloud faced the largest recorded attack at 453.8 Gbps, enough to overwhelm the bandwidth of many small cities.
Impact and Consequences
The cost of launching a DDoS attack is very low, creating a thriving underground market; for example, 1 Gbps of traffic for one hour can be bought for about 50 CNY. Surveys show that 64 % of platform providers, 66 % of hosting and VoIP providers, and 61 % of service providers have been affected, with 38 % unable to protect core business operations.
Financial losses per incident range from roughly $52 000 to $444 000, and indirect effects such as reputation damage and loss of customer trust can be far more severe.
Common Mitigation Strategies
Maintain multiple domain backups.
Deploy each domain’s entry servers across different major cloud providers and use CDNs.
Establish VPN tunnels between clouds for synchronized data and heartbeat monitoring.
Keep 1–2 redundant nodes that are not publicly exposed to ensure minimal service continuity.
Effective response requires quickly distinguishing between a DDoS attack and hardware failure, contacting cloud providers to filter malicious sources, and activating emergency backup services when needed.
Excerpted from OneAPM.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
21CTO
21CTO (21CTO.com) offers developers community, training, and services, making it your go‑to learning and service platform.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
