Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly

This article explains what DDoS attacks are, highlights famous large‑scale incidents, examines their financial and reputational impact on businesses, and outlines practical mitigation strategies that cloud providers and organizations can adopt to detect and survive such attacks.

21CTO
21CTO
21CTO
Why DDoS Attacks Still Threaten Everyone and How to Respond Quickly

What is DDoS?

DDoS (Distributed Denial of Service) attacks use multiple compromised computers as a platform to flood one or more targets with massive amounts of legitimate‑looking traffic, exhausting network resources and rendering services unavailable.

Notable DDoS Incidents

March 2013: Spamhaus and CloudFlare suffered a record 300 Gbps attack that nearly crippled European networks.

February 2014: A 400 Gbps attack hit CloudFlare customers, affecting roughly 785 000 sites including 4chan and WikiLeaks.

March 2014: Anonymous launched a massive attack on Sony’s PlayStation Network, causing service outage and data theft of 77 million users.

December 2014: A Chinese gaming company on Alibaba Cloud faced the largest recorded attack at 453.8 Gbps, enough to overwhelm the bandwidth of many small cities.

Impact and Consequences

The cost of launching a DDoS attack is very low, creating a thriving underground market; for example, 1 Gbps of traffic for one hour can be bought for about 50 CNY. Surveys show that 64 % of platform providers, 66 % of hosting and VoIP providers, and 61 % of service providers have been affected, with 38 % unable to protect core business operations.

Financial losses per incident range from roughly $52 000 to $444 000, and indirect effects such as reputation damage and loss of customer trust can be far more severe.

Common Mitigation Strategies

Maintain multiple domain backups.

Deploy each domain’s entry servers across different major cloud providers and use CDNs.

Establish VPN tunnels between clouds for synchronized data and heartbeat monitoring.

Keep 1–2 redundant nodes that are not publicly exposed to ensure minimal service continuity.

Effective response requires quickly distinguishing between a DDoS attack and hardware failure, contacting cloud providers to filter malicious sources, and activating emergency backup services when needed.

Excerpted from OneAPM.
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

DDoSMitigationcloud securityDistributed Denial of Servicecybersecuritynetwork attack
21CTO
Written by

21CTO

21CTO (21CTO.com) offers developers community, training, and services, making it your go‑to learning and service platform.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.