Learning Library

← Back to Library

Understanding the Basics of DDoS Attacks

Key Points

  • A DDoS attack floods a target application with excessive traffic, causing severe slowdown, outages, or other abnormal behavior for legitimate users.
  • Normal user traffic normally travels smoothly from the internet to the server, but a DDoS overwhelms this “pipe” with malicious traffic, creating congestion that blocks legitimate requests.
  • Attackers build or hijack large networks of compromised devices—known as botnets—to generate coordinated traffic from many sources simultaneously.
  • The botnet’s controlled computers act like remote robots, sending continuous traffic that overwhelms the target’s connection, preventing regular users from accessing the service.
  • If an application exhibits sudden latency, downtime, or odd behavior, it may be under a DDoS attack, prompting viewers to seek further information and ask questions.

Full Transcript

# Understanding the Basics of DDoS Attacks **Source:** [https://www.youtube.com/watch?v=z503nLsfe5s](https://www.youtube.com/watch?v=z503nLsfe5s) **Duration:** 00:03:51 ## Summary - A DDoS attack floods a target application with excessive traffic, causing severe slowdown, outages, or other abnormal behavior for legitimate users. - Normal user traffic normally travels smoothly from the internet to the server, but a DDoS overwhelms this “pipe” with malicious traffic, creating congestion that blocks legitimate requests. - Attackers build or hijack large networks of compromised devices—known as botnets—to generate coordinated traffic from many sources simultaneously. - The botnet’s controlled computers act like remote robots, sending continuous traffic that overwhelms the target’s connection, preventing regular users from accessing the service. - If an application exhibits sudden latency, downtime, or odd behavior, it may be under a DDoS attack, prompting viewers to seek further information and ask questions. ## Sections - [00:00:00](https://www.youtube.com/watch?v=z503nLsfe5s&t=0s) **Basics of DDoS Attacks** - Ryan Sumner explains how a DDoS attack floods a target with malicious traffic, overwhelming its connection and causing slowdowns, outages, or other unexpected disruptions for legitimate users. - [00:03:09](https://www.youtube.com/watch?v=z503nLsfe5s&t=189s) **Explaining Basic DDoS Congestion** - The speaker describes how a flood of malicious traffic overwhelms network capacity, preventing legitimate users from accessing services and resulting in slowdowns or downtime. ## Full Transcript
0:00Hi, I'm Ryan Sumner. 0:01I'm a Chief Network Architect with IBM Cloud. 0:03Today, I'm gonna give you the basics of a DDoS attack. 0:07A DDoS Attack is an attempt by an attacker 0:10to create so much traffic or congestion 0:14to a target application, or an internet application, 0:18that It impedes the traffic flow of normal visitors. 0:23So, what normal visitors might see, or the owner of the application might see, 0:28as a result of a DDoS attack being impeded upon them, 0:33is they might see a drastic reduction in speed, 0:38they might see a complete outage, 0:42or they'll see some unexplained consequences 0:49that they don't normally see within their day-to-day operations. 0:51So, to demonstrate this a bit more, 0:55I'll show to you how normal traffic flows 0:59from users on the internet to the target server 1:03using its internet connection here. 1:06So, we'll have normal Internet users here. 1:13We'll have the clean traffic that comes through the internet 1:16and traverses through the connection from the internet to the target server. 1:22So, this traffic flows just perfectly fine 1:25with no slowdown or 1:28- there's no constriction on that traffic flow. 1:32So, how does an attacker create so much traffic that it causes 1:37an inability for this clean traffic to flow from the internet to the target server through its connection. 1:44So does the attacker just have that many friends? 1:46Usually not. 1:47And he's not going to pick up the phone and say, 1:49"Jump on your computer, now let's all attack this target server!" 1:52He's done his homework. 1:54And he has access to a collection, or a network of attacked, 1:58or hacked, or compromised computers across the internet. 2:01Sometimes these might be IoT devices, they might be 2:04people's computers, they might be other servers on the internet. 2:08But all of these attacked or compromised computers 2:12are at the control of the attacker and we call that network a "botnet." 2:18The reason it's called a botnet is because now 2:21the attacker can remotely control this network of hacked computers 2:26almost like they're robots. 2:28And the attacker can tell that botnet what to do, 2:32and exactly for how long, and exactly where he wants to do it. 2:36So, the attacker when they're ready to start the attack, 2:41will call on all of these hacked computers, 2:48or robots within the botnet, 2:51and start to generate traffic from all of these systems over the internet. 2:59Now, what ends up happening 3:02is we create congestion through this pipe that's coming from the internet to the target server. 3:09So, as this congestion is occurring, 3:13and this never stops, they've created so much congestion across it. 3:17And the amount of time that the botnet that is being executed 3:20continues to exceed, and these internet users are continuing to attempt to come in. 3:27However, the pipe is so congested that they can no longer enter the roadway. 3:32So, this is the basics of a DDoS Attack. 3:35So, if your application is slow, you're experiencing downtime, 3:39or just other odd behavior you might be under a DDoS. 3:43Check below for more information. 3:45Leave us some comments, ask some questions, and if you like this content 3:49please subscribe and "like".