A DDoS attack is an assault on a network that works by overwhelming the target, a resource or a connection with large amounts of internet traffic or requests – more than the system can handle.<\/span><\/p>The effect of this traffic? It uses up all available resources to deal with these requests, leaving users unable to establish use of the service. This sudden increase in traffic can also cause web servers to crash.<\/span><\/p>Imagine your internet connection as a letterbox, if your postman delivers one or two letters consistently this would cause no problems (other than you\u2019d have a lot of letters to open). Now imagine lots of unknown people trying to put hundreds of letters through simultaneously; nothing would get through the now jammed letterbox, and your trusted postman would be unable to deliver your valid mail. This is, in essence, what happens when an attack occurs.<\/span><\/p>For a DDoS attack to take place, a hacker typically gains control of a network of machines. These computers, or devices, are infected with malware, turning each one into a possible source of extra traffic. This group of remotely controlled machines is also called a botnet.<\/span><\/p>Others ways to generate an attack are possible, such as causing normally well behaved services to send their responses to the victim. Using the previous analogy it would be like sending many letters to unknown postal addresses with the victim\u2019s address on the back, resulting in them once again ending up with a jammed letterbox, but this time full of \u2018return to sender\u2019 letters.<\/span><\/p>The attacker is able to direct the machines to the target network. Once the target IP address has been identified, each bot will send requests and traffic to that network, pushing it beyond its capacity and resulting in a denial of service to the normal traffic flowing to the site.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t