There aren't many things in this life that endure for more than 20 years, especially when it comes to computers. Hardware, software, services and even websites tend not to have a shelf life that extends into two decades. Yet website owners still find themselves staring down the barrel of a type of distributed denial of service attack that has been in use since 1996. It's high time SYN floods stopped being effective, so here's a rundown on what they are and what you can do to stop them.

Details on DDoS

Basically, DDoS attacks use a botnet – a network of internet-connected devices that have been hijacked for remote use – to overwhelm a targeted website or server with malicious traffic, leaving it too slow to be used or offline altogether. DDoS attacks are a major threat to websites, and that threat is only growing as DDoS for hire services gain popularity and botnets comprised of unsecured Internet of Things devices fire off attacks of previously unseen sizes.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

  • Critical CUTimes.com information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including Law.com and GlobeSt.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.