What is a distributed denial-of-service (DDoS) attack?

Image source:  Canva
Image source: Canva

POSTED:  October 2, 2025

What is a distributed denial-of-service (DDoS) attack?

A DDoS is a coordinated cyberattack with the intent to disrupt internet traffic of a specific network or server [1]. This attack is done by sending an overwhelming amount of traffic to the target from many different locations using bots. Due to the high number of incoming requests from illegitimate users, real users may not be able to access the targeted network.

Types of DDoS Attacks

  • Volumetric Attacks:  Send a high volume of traffic to a specific target to consume its bandwidth and impede the victim’s internet access [2].

  • Application Attacks:  Intentionally exhaust server resources by sending an overwhelming amount of hypertext transfer protocol (HTTP) requests to a server during a short amount of time, which can compromise the functionality of an application. Each HTTP request asks for the server to load a webpage, which consumes resources on the server side.  These are also referred to as “Layer 7 attacks” due to the DDoS targeting the seventh layer of the Open Systems Interconnection (known as OSI) model.

  • Protocol Attacks:  Disrupt communication within a network by exploiting vulnerable network protocols, hindering the communication between devices and the server.

DDOS Attack Diagram

Figure 1.  Diagram of Main Elements Present in a Typical DDoS Attack (Source:  Cloudflare).

Preventing DDoS Attacks

Preventing DDoS attacks can be crucial in ensuring that critical networks remain operational and accessible [3]. There are several security practices and tools used to protect against these cyberattacks, which include the following:

  • Rate Limiting:  Restricting the number of requests that can be received by a single user over a certain duration. This prevents servers from getting overloaded with traffic from a specific malicious source.

  • Attack Surface Reduction:  Implementing restrictions on which users can access a server, depending on their location, network settings, and applications used.

  • Threat Monitoring:  Observing live website traffic to spot any anomalies that could be a sign of a DDoS attack and acting based on the information.

  • Other DDoS Prevention Tools

    • Web Application Firewall

    • Intrusion Detection/Prevention Systems

    • DDoS Mitigation Software

    • Content Delivery Networks (CDNs)

    • Traffic-Scrubbing Services

Notable DDoS Attacks

Google Cloud (2023)

Google Cloud was the victim of the largest DDoS attack recorded in history, with its servers receiving a record-breaking 398 million requests per second (RPS) [4]. This attack was 7 1/2 times larger than the previous largest attack, which peaked at 46 million RPS. Google was able to block the attack, which used a new “Rapid Reset” technique to send a high amount of HTTP requests.

U.S. States and Airports (2022)

A Russian hacking group, known as “Killnet,” was able to take down over a dozen state government websites in an orchestrated DDoS attack [5]. The websites remained inaccessible to users for an extended time, disrupting critical infrastructure and services. Shortly after the initial attack, the group launched another DDoS attack targeting around 40 major U.S. airports, causing their websites to go offline by sending a large amount of malicious traffic.

Amazon Web Services (2020)

Amazon received a DDoS attack, with traffic peaking at 2.3 TB/s. The hacker was able to exploit a network protocol called Connectionless Lightweight Directory Access Protocol (known as CLDAP), which is a protocol used for user directories.

Relevant Applications to the U.S. Department of Defense (DoD)

Military Infrastructure and Base Networks

Military bases and installations rely on classified and unclassified networks to manage logistics, administration, and security systems. DDoS attacks against these networks could incapacitate gate access systems, surveillance, or even logistics chains. The integration of intrusion prevention systems and advanced traffic filtering ensures these systems remain operational, even under hostile cyber conditions.

Securing Public-Facing Government Websites

Websites maintained by the DoD, such as recruitment portals, informational sites, and veteran services, can be targeted by hacktivists or nation-state actors. As seen in the Killnet attacks on state and airport websites, even temporary outages can erode public trust and impede service delivery. CDNs and traffic-scrubbing services can minimize these risks by absorbing and dispersing malicious traffic.

Protection of Command, Control, and Communication (C3) Systems

C3 systems are vital to the DoD’s operational readiness and battlefield coordination. A DDoS attack targeting these systems could severely disrupt decision-making processes, delay mission execution, and compromise situational awareness [6]. Ensuring high availability through redundancy, segmented network architecture, and real-time threat monitoring is essential. Incorporating cloud‑based DDoS mitigation platforms and automated incident response protocols helps maintain uninterrupted communications across joint forces and allied networks in contested environments.

Additional Resources

Latest Related News/Articles

References