Home / Industry

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

We know what the results of a DDoS attack look like: huge disruption, brand damage, and potential revenue loss of tens of thousands of dollars per hour. But what does the attack itself look like?

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. This type of attack can overwhelm a server's available TCP connections with phony requests.

In the video, the dots move from the network blocks shown on the left toward the attack target. The colors of the dots are randomly assigned to participating IP addresses or IP address groups. Each dot represents a web event directed at the target during the given time.


Filmed in Neustar's Security Operations Center, this video shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. This type of attack can overwhelm a server's available TCP connections with phony requests. On the far lower right corner of the screen, a log counter tallies the number of log events shown in this example. Note that the first 30,000 log events happening during the first three minutes of this specific DDoS attack. As a size reference, the full attack would have millions of events.

At some points, the traffic grows dense and bombards the target, and at other times it decreases and fewer dots appear.

On the far lower right corner of the screen, a log counter tallies the number of log events shown in this example. Note that the first 30,000 log events happening during the first three minutes of this specific DDoS attack. As a size reference, the full attack would have millions of events.

Be Ready: 7 Best Practices for How to Prevent DDoS Attacks

Neustar

About Neustar – Neustar is an information services and technology company and a leader in identity resolution providing the data and technology that enables trusted connections between companies and people at the moments that matter most. Neustar offers industry-leading solutions in Marketing, Risk, Communications, Security and Registry that responsibly connect data on people, devices and locations, continuously corroborated through billions of transactions. Neustar serves more than 8,000 clients worldwide, including 60 of the Fortune 100. Visit Page

Follow CircleID on
SHARE THIS POST

If you are pressed for time ...

... this is for you. More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Vinton Cerf, Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign

Whois

Sponsored byWhoisXML API

New TLDs

Sponsored byAfilias

IP Addressing

Sponsored byAvenue4 LLC

Cybercrime

Sponsored byThreat Intelligence Platform