Home / Industry

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

We know what the results of a DDoS attack look like: huge disruption, brand damage, and potential revenue loss of tens of thousands of dollars per hour. But what does the attack itself look like?

This video visualization, filmed in Neustar's Security Operations Center, shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. This type of attack can overwhelm a server's available TCP connections with phony requests.

In the video, the dots move from the network blocks shown on the left toward the attack target. The colors of the dots are randomly assigned to participating IP addresses or IP address groups. Each dot represents a web event directed at the target during the given time.


Filmed in Neustar's Security Operations Center, this video shows the first three minutes of an actual DDoS attack on a company's Transmission Control Protocol Synchronize (TCP SYN) authentication. This type of attack can overwhelm a server's available TCP connections with phony requests. On the far lower right corner of the screen, a log counter tallies the number of log events shown in this example. Note that the first 30,000 log events happening during the first three minutes of this specific DDoS attack. As a size reference, the full attack would have millions of events.

At some points, the traffic grows dense and bombards the target, and at other times it decreases and fewer dots appear.

On the far lower right corner of the screen, a log counter tallies the number of log events shown in this example. Note that the first 30,000 log events happening during the first three minutes of this specific DDoS attack. As a size reference, the full attack would have millions of events.

Be Ready: 7 Best Practices for How to Prevent DDoS Attacks

Neustar

About Neustar – Every day, the world generates roughly 2.5 quadrillion bits of data. Neustar isolates certain elements and analyzes, simplifies and edits them to make precise and valuable decisions that drive results. Learn More

Related topics: Cyberattack, Cybersecurity, DDoS

 
   

Don't miss a thing – get the Weekly Wrap delivered to your inbox.

Related Blogs

Related News

Explore Topics

Dig Deeper

Cybersecurity

Sponsored by Verisign

IP Addressing

Sponsored by Avenue4 LLC

DNS Security

Sponsored by Afilias

Mobile Internet

Sponsored by Afilias Mobile & Web Services

Promoted Posts

Buying or Selling IPv4 Addresses?

ACCELR/8 is a transformative IPv4 market solution developed by industry veterans Marc Lindsey and Janine Goodman that enables organizations buying or selling blocks as small as /20s to keep pace with the evolving demands of the market by applying processes that have delivered value for many of the largest market participants. more»

Industry Updates – Sponsored Posts

Verisign Named to the Online Trust Alliance's 2017 Audit and Honor Roll

Attacks Decrease by 23 Precent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Leading Internet Associations Strengthen Cooperation

Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

2016 U.S. Election: An Internet Forecast

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail Raises $12M for Its Email Authentication Service

Don't Gamble With Your DNS

Defending Against Layer 7 DDoS Attacks

Understanding the Risks of the Dark Web

New TLD? Make Sure It's Secure

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Is Your TLD Threat Mitigation Strategy up to Scratch?

i2Coalition to Host First Ever Smarter Internet Forum