{"id":25642,"date":"2022-12-07T16:10:43","date_gmt":"2022-12-07T16:10:43","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25642"},"modified":"2023-07-31T20:57:23","modified_gmt":"2023-07-31T20:57:23","slug":"ddos","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/","title":{"rendered":"What Is a Distributed Denial of Service (DDoS) Attack?"},"content":{"rendered":"<p>A distributed denial-of-service (DDoS) attack is a type of cyberattack in which multiple compromised systems are used to target a single system, usually with the goal of overwhelming its resources and making it unavailable to its users. DDoS attacks can be launched from anywhere in the world using any type of device that can be compromised, including laptops, desktops, routers, smartphones, and even internet-connected appliances.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6db5e417c8\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6db5e417c8\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Intent-Prevalence-and-Severity-of-DDoS-Attacks\" title=\"Intent, Prevalence, and Severity of DDoS Attacks\">Intent, Prevalence, and Severity of DDoS Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#How-Do-Distributed-Denial-of-service-Attacks-Work\" title=\"How Do Distributed Denial-of-service Attacks Work?\">How Do Distributed Denial-of-service Attacks Work?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#How-do-attackers-create-a-botnet\" title=\"How do attackers create a botnet?\">How do attackers create a botnet?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Categories-and-types-of-DDoS-attacks\" title=\"Categories and types of DDoS attacks\">Categories and types of DDoS attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Volumetric\" title=\"Volumetric\">Volumetric<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Protocol\" title=\"Protocol\">Protocol<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Application\" title=\"Application\">Application<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Other-types-of-DDoS-attacks\" title=\"Other types of DDoS attacks\">Other types of DDoS attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Identifying-DDoS-attacks\" title=\"Identifying DDoS attacks\">Identifying DDoS attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#What-if-it-is-genuine-traffic\" title=\"What if it is genuine traffic?\">What if it is genuine traffic?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#How-Can-You-Mitigate-DDoS-Attacks\" title=\"How Can You Mitigate DDoS Attacks?\">How Can You Mitigate DDoS Attacks?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Preparing-for-DDoS-Attacks\" title=\"Preparing for DDoS Attacks\">Preparing for DDoS Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Responding-to-DDoS-Attacks\" title=\"Responding to DDoS Attacks\">Responding to DDoS Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#Recovering-from-DDoS-Attacks\" title=\"Recovering from DDoS Attacks\">Recovering from DDoS Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#DDoS-Software-Solutions-Services\" title=\"DDoS Software Solutions &amp; Services\">DDoS Software Solutions &amp; Services<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Intent-Prevalence-and-Severity-of-DDoS-Attacks\"><\/span>Intent, Prevalence, and Severity of DDoS Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS perpetrators can range from single individuals working alone to organized criminal groups and even foreign governments. The intention of a DDoS attack can vary but often includes causing financial damage to a targeted organization or simply causing disruption and chaos.<\/p>\n<p>DDoS attacks have become increasingly common in recent years, with numerous high-profile websites and online services falling victim to successful attacks. For example, in 2016, the website of security journalist Brian Krebs was hit with the largest DDoS attack ever recorded at the time, with an estimated peak of <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos\/\" target=\"_blank\" rel=\"noopener\">665 gigabits per second<\/a> (Gbps) of traffic.<\/p>\n<p>Recent attacks have been of much greater magnitude. For example, in February 2020, Amazon thwarted a DDoS attack that peaked at 2.3 terabits per second. And in late 2021, Russia\u2019s Yandex was also hit by a DDoS attack that flooded it with millions of web page requests at a rate of 21.8 million requests per second, among other <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-fights-off-another-record-ddos-attack\/\" target=\"_blank\" rel=\"noopener\">record attacks<\/a>.<\/p>\n<p>Over the past year, DDoS attacks have been politically motivated, with many linked to the Russia-Ukraine conflict. According to <a href=\"https:\/\/securelist.com\/ddos-attacks-in-q2-2022\/107025\/#:~:text=The%20average%20duration%20of%20a,the%20figure%20has%20grown%20hundredfold.\" target=\"_blank\" rel=\"noopener\">Kaspersky<\/a>, some of the organizations targeted by massive DDoS attacks in the first half of 2022 include NATO, Israel\u2019s Airport Authority, the U.K.\u2019s Port of London Authority, the Turkish ministry of defense, the Czech government and public transportation websites, Ukraine\u2019s government websites, and even <a href=\"https:\/\/www.esecurityplanet.com\/threats\/russian-hackers-ddos-us-airports\/\" target=\"_blank\" rel=\"noopener\">major U.S. airports<\/a>.<\/p>\n<p>The severity of DDoS attacks can vary, but they can have significant consequences for targeted organizations. In addition to the potential loss of revenue and damage to reputation, victims may also face fines or penalties if they are unable to fulfill their obligations due to an attack. According to Ponemon, the average DDoS attack costs an average of $22,000 a minute, with the typical attack lasting just under an hour, for an average cost of more than $1 million. That damage will vary considerably by company size.<\/p>\n<p><strong>See also: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-stop-ddos-attacks-tips-for-fighting-ddos-attacks\/\" target=\"_blank\" rel=\"noopener\">How to Stop DDoS Attacks in Three Stages<\/a><\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How-Do-Distributed-Denial-of-service-Attacks-Work\"><\/span>How Do Distributed Denial-of-service Attacks Work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>DDoS attacks use a network of compromised computers and devices, known as a botnet, to flood the targeted system with overwhelming amounts of traffic. By sending multiple requests simultaneously from numerous sources, the attacker can overload the target\u2019s resources and prevent legitimate users from accessing it.<\/p>\n<figure id=\"attachment_25644\" aria-describedby=\"caption-attachment-25644\" style=\"width: 675px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-25644 size-full\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/10\/DDoS-botnet.jpg\" alt=\"\" width=\"675\" height=\"700\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg 675w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet-289x300.jpg 289w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet-150x156.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet-300x311.jpg 300w\" sizes=\"(max-width: 675px) 100vw, 675px\" \/><figcaption id=\"caption-attachment-25644\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/www.researchgate.net\/figure\/A-diagram-of-a-DDoS-attack-performed-with-a-botnet_fig1_357168204\" target=\"_blank\" rel=\"noopener\">Research Gate<\/a><\/figcaption><\/figure>\n<h3><span class=\"ez-toc-section\" id=\"How-do-attackers-create-a-botnet\"><\/span>How do attackers create a botnet?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Attackers typically infect devices with <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware\/\" target=\"_blank\" rel=\"noopener\">malware<\/a> that gives them hidden control. Once they have control of enough devices, they can instruct them to all send traffic to the same target at the same time, creating a DDoS attack.<\/p>\n<p>However, the commoditization of DDoS attacks has made them more prevalent and more damaging. There are now services that allow anyone to launch a DDoS attack without having to create their own botnet. These services, known as DDoS-for-hire or DDoS as a service, provide attackers with the capability to launch powerful DDoS attacks without any technical expertise.<\/p>\n<p>For example, a 33-year-old man in Illinois was recently <a href=\"https:\/\/www.justice.gov\/usao-cdca\/pr\/illinois-man-sentenced-2-years-federal-prison-operating-subscription-based-computer\" target=\"_blank\" rel=\"noopener\">sentenced to two years in prison<\/a> for running a subscription-based DDoS attack service.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Categories-and-types-of-DDoS-attacks\"><\/span>Categories and types of DDoS attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are three primary <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-ddos-attacks\/\" target=\"_blank\" rel=\"noopener\">categories of DDoS attacks<\/a>: volumetric, protocol, and application.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Volumetric\"><\/span>Volumetric<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Volumetric attacks are the most common type of DDoS attack. They work by flooding the target with traffic until it can no longer cope with the volume of incoming requests and becomes overwhelmed. There are several volumetric attacks, including UDP flood attacks, CharGEN flood, ICMP (Ping) flood, ICMP fragmentation flood, and misused application attacks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Protocol\"><\/span>Protocol<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Protocol attacks exploit vulnerabilities in the protocols themselves to cause a DoS condition. The most common type of protocol attack is the SYN flood attack. Other protocol attacks include TCP flood attacks, session attacks, slowloris, ping of death, smurf attacks, fraggle attacks, Low Orbit Ion Cannon (LOIC), and High Orbit Ion Cannon (HOIC).<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Application\"><\/span>Application<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Application attacks target vulnerabilities in specific applications or services running on a server. The most common type of application attack is the HTTP Flood attack.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Other-types-of-DDoS-attacks\"><\/span>Other types of DDoS attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Other types of DDoS attacks don\u2019t fall neatly into one of the three primary categories. These include:<\/p>\n<ul>\n<li><strong>Regular Expression DoS (ReDoS):<\/strong> ReDoS attacks target the regular expressions used by a particular application to process data. By sending specially crafted input that takes a long time for the application\u2019s regular expression to process, the attacker can overload and crash the server or slow it down significantly.<\/li>\n<li><strong>Advanced Persistent DoS (APDoS):<\/strong> APDoS attacks are similar to DDoS attacks, but they are longer and more sophisticated in nature. The attacker will launch a relatively small attack to gain access to the target\u2019s resources and then use that foothold to continuously launch attacks and exhaust the target\u2019s resources over a long period.<\/li>\n<li><strong>Multi-Vector Attacks:<\/strong> A multi-vector attack uses multiple types of attacks, such as volumetric and protocol attacks, simultaneously to overwhelm the target\u2019s resources from multiple angles.<\/li>\n<li><strong>Zero-Day DDoS Attacks:<\/strong> These attacks exploit previously unknown vulnerabilities in a system or application, making them particularly difficult to defend against.<\/li>\n<\/ul>\n<p><strong>Read more: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-ddos-attacks\/\" target=\"_blank\" rel=\"noopener\">Complete Guide to the Types of DDoS Attacks<\/a><\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Identifying-DDoS-attacks\"><\/span>Identifying DDoS attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It can be difficult to distinguish between a sudden spike in traffic from legitimate users and a DDoS attack. However, there are some red flags to look for.<\/p>\n<ul>\n<li>An unusually high amount of traffic coming from a single source or IP address<\/li>\n<li>Traffic coming from multiple sources at unusual times or patterns<\/li>\n<li>Requests that seem out of place or malformed<\/li>\n<li>A sudden decrease in website or <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a> performance<\/li>\n<li>Slowness or unresponsiveness in specific services or applications<\/li>\n<li>Inability to access certain websites or services<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"What-if-it-is-genuine-traffic\"><\/span>What if it is genuine traffic?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>It could be a sudden surge in popularity or a viral marketing campaign. In these cases, it\u2019s crucial to have proper <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\" target=\"_blank\" rel=\"noopener\">network monitoring<\/a> and scaling capabilities in place to ensure your infrastructure can handle the increased traffic without impacting performance.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How-Can-You-Mitigate-DDoS-Attacks\"><\/span>How Can You Mitigate DDoS Attacks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Prevention of DDoS attacks hinges on IT security teams adopting basic preparation, reaction, and recovery principles.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Preparing-for-DDoS-Attacks\"><\/span>Preparing for DDoS Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>There are various actions and best practices that security teams can take to prepare for and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-ddos-attacks\/\">prevent DDoS attacks<\/a>. These include:<\/p>\n<ul>\n<li><strong>Deploy Firewalls and Intrusion Detection Systems (IDS):<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noopener\">Next-generation firewalls<\/a> can block unusual or suspicious traffic, while <a href=\"https:\/\/www.esecurityplanet.com\/networks\/intrusion-detection-and-prevention-systems\/\" target=\"_blank\" rel=\"noopener\">intrusion detection and prevention systems<\/a> can identify and alert on potential attacks.<\/li>\n<li><strong>Use Secure Protocols:<\/strong> Secure protocols such as Secure Shell (SSH) and Transport Layer Security (TLS) can help prevent protocol attacks.<\/li>\n<li><strong>Keep Software and Systems up to Date:<\/strong> Regularly <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\" target=\"_blank\" rel=\"noopener\">patching and updating<\/a> software and operating systems helps mitigate vulnerabilities attackers can exploit.<\/li>\n<li><strong>Network Segmentation:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\" target=\"_blank\" rel=\"noopener\">Segmenting your network<\/a> can limit the impact of a successful attack and make it easier to isolate and mitigate the attack.<\/li>\n<li><strong>Restrict Access:<\/strong> Only allowing authorized users to access certain services and applications can limit the potential attack surface, a principle of <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\" target=\"_blank\" rel=\"noopener\">zero trust architectures<\/a>.<\/li>\n<li><strong>Use Load Balancers:<\/strong> Load balancers can distribute traffic evenly across multiple servers and prevent a single server from being overwhelmed by an attack.<\/li>\n<li><strong>Consider Infrastructure Overprovisioning:<\/strong> Having extra bandwidth and resources available can help maintain performance in the event of a DDoS attack.<\/li>\n<li><strong>Consider Infrastructure Hardening:<\/strong> By making adjustments to how settings are configured, removing any unnecessary features and adding security-enhancing optional features, servers, gateways, firewalls, and other IT infrastructure can be made much more secure against attacks.<\/li>\n<li><strong>Enable Anti-DDoS Features:<\/strong> Many network devices and services offer anti-DDoS features, such as rate limiting and filtering, which can help mitigate attacks.<\/li>\n<li><strong>Purchase Extra DDoS Protection:<\/strong> Some service providers offer DDoS protection as an additional service. If you\u2019re looking for protection against DDoS attacks, various vendors offer software and hardware solutions and services that can help.<\/li>\n<li><strong>Create a DDoS Playbook:<\/strong> Developing an <a href=\"https:\/\/www.esecurityplanet.com\/networks\/incident-response-how-to-prepare-for-attacks-and-breaches\/\" target=\"_blank\" rel=\"noopener\">incident response plan<\/a> for what to do in the event of a DDoS attack can help ensure a fast and effective response. This includes identifying key individuals and roles, establishing communication channels, documenting mitigation procedures, and conducting regular testing and drills.<\/li>\n<li><strong>Continuous DDoS Monitoring:<\/strong> Regularly monitoring network performance, traffic, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\" target=\"_blank\" rel=\"noopener\">logs<\/a> can help identify potential attacks in their early stages and allow for a faster response.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Responding-to-DDoS-Attacks\"><\/span>Responding to DDoS Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In the event of a DDoS attack, it\u2019s important to quickly identify and confirm the attack, gather information about its impact and severity, and contain and mitigate the attack. Some specific responses you can take include:<\/p>\n<ul>\n<li><strong>Notify Your ISP or a Third-Party DDoS Mitigation Service:<\/strong> Your internet service provider (ISP) or a third-party DDoS mitigation service may be able to help redirect and filter malicious traffic.<\/li>\n<li><strong>Attack Characterization:<\/strong> Gathering information about the attack, including what type of attack it is and what systems or services are being targeted, can help inform mitigation efforts.<\/li>\n<li><strong>Attack Traceback:<\/strong> Tracing the attack back to its source can help identify the attacker and potentially gather evidence for legal action.<\/li>\n<li><strong>Attack Tolerance and Mitigation:<\/strong> Implementing steps to mitigate the attack, such as rate limiting or filtering, can help minimize its impact and restore services.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Recovering-from-DDoS-Attacks\"><\/span>Recovering from DDoS Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Once a DDoS attack has been mitigated, it\u2019s essential to review what happened and what could be done differently in the future to prevent or better handle similar attacks.<\/p>\n<p>This could include implementing any necessary security updates, adjusting network and infrastructure configurations, revisiting your DDoS playbook, and conducting <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\" target=\"_blank\" rel=\"noopener\">employee training<\/a>. It\u2019s also important to monitor for any lingering effects and continue monitoring for future attacks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"DDoS-Software-Solutions-Services\"><\/span>DDoS Software Solutions &amp; Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are various software solutions and services designed to protect against DDoS attacks. These can include network devices with anti-DDoS features, firewalls and intrusion prevention systems, and specialized DDoS protection software and services. It\u2019s important to research and consider what solution is best carefully.<\/p>\n<p>When shopping for a DDoS solution, we recommend that potential solutions include the following abilities:<\/p>\n<ul>\n<li>Filter and monitor incoming web traffic.<\/li>\n<li>Handle high levels of malicious traffic.<\/li>\n<li>Regulate traffic flow or set a minimum\/maximum level for traffic.<\/li>\n<li>Provide reporting and analytics.<\/li>\n<li>Be easy to set up and configure.<\/li>\n<li>Come with a traffic management dashboard.<\/li>\n<li>Have a service-level agreement (SLA) with guaranteed uptime and support.<\/li>\n<li>Offer integrations with infrastructure as code (IaS) software and other application programming interfaces (APIs).<\/li>\n<li>Offer continual updates and technical support.<\/li>\n<\/ul>\n<p>Some of the leading <a href=\"https:\/\/www.esecurityplanet.com\/products\/distributed-denial-of-service-ddos-protection-vendors\/\" target=\"_blank\" rel=\"noopener\">DDoS software &amp; services vendors<\/a> include:<\/p>\n<ul>\n<li>Akamai<\/li>\n<li>Imperva<\/li>\n<li>Radware<\/li>\n<li>Cloudflare<\/li>\n<li>Neustar<\/li>\n<li>NetScout<\/li>\n<li>Ribbon<\/li>\n<li>Amazon Web Services<\/li>\n<\/ul>\n<p>The prevalence and severity of DDoS attacks continues to grow, making it vital for individuals and organizations to understand what DDoS attacks are and how they can protect against them. While there is no one-size-fits-all solution, implementing a combination of prevention measures and a response plan can help defend against these disruptive attacks.<\/p>\n<p>Read Next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security-threats\/\"><strong>10 Network Security Threats Everyone Should Know<\/strong><\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6db5e3f2a3-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6db5e3f2a3\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6db5e3f2a3\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6db5e3f2a3\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6db5e3f2a3\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6db5e3f2a3\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6db5e3f2a3\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A distributed denial-of-service (DDoS) attack is a type of cyberattack in which multiple compromised systems are used to target a single system, usually with the goal of overwhelming its resources and making it unavailable to its users. DDoS attacks can be launched from anywhere in the world using any type of device that can be [&hellip;]<\/p>\n","protected":false},"author":308,"featured_media":25644,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[4340,3790,980,24022,3414,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,385,390,402,395,377,381,375,31775,392],"class_list":["post-25642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-botnet","tag-cybersecurity","tag-ddos","tag-ddos-attacks","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-cloud-saas-and-hosted-security-services","b2b_product-content-filtering","b2b_product-ddos","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-gateway-and-network-security","b2b_product-network-access-control-nac","b2b_product-security-management","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DDoS Attacks: Disabling Networks with Overwhelming Traffic<\/title>\n<meta name=\"description\" content=\"A distributed denial-of-service (DDoS) attack. Learn about the types, motives, methods, and protection against DDoS attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS Attacks: Disabling Networks with Overwhelming Traffic\" \/>\n<meta property=\"og:description\" content=\"A distributed denial-of-service (DDoS) attack. Learn about the types, motives, methods, and protection against DDoS attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-07T16:10:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-31T20:57:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"675\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kihara Kimachia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kihara Kimachia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\"},\"author\":{\"name\":\"Kihara Kimachia\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2567e99a9b3855ab24d4f920bf22a958\"},\"headline\":\"What Is a Distributed Denial of Service (DDoS) Attack?\",\"datePublished\":\"2022-12-07T16:10:43+00:00\",\"dateModified\":\"2023-07-31T20:57:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\"},\"wordCount\":1854,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg\",\"keywords\":[\"botnet\",\"cybersecurity\",\"DDOS\",\"DDoS attacks\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\",\"name\":\"DDoS Attacks: Disabling Networks with Overwhelming Traffic\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg\",\"datePublished\":\"2022-12-07T16:10:43+00:00\",\"dateModified\":\"2023-07-31T20:57:23+00:00\",\"description\":\"A distributed denial-of-service (DDoS) attack. Learn about the types, motives, methods, and protection against DDoS attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg\",\"width\":675,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is a Distributed Denial of Service (DDoS) Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2567e99a9b3855ab24d4f920bf22a958\",\"name\":\"Kihara Kimachia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/kihara-kimachia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/kihara-kimachia-150x150.jpg\",\"caption\":\"Kihara Kimachia\"},\"description\":\"eSecurity Planet contributor Kihara Kimachia has been a writer and digital marketing consultant for more than ten years. He has a degree in international business administration and is passionate about technology, writing for for several leading tech websites.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/kihara-kimachia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS Attacks: Disabling Networks with Overwhelming Traffic","description":"A distributed denial-of-service (DDoS) attack. Learn about the types, motives, methods, and protection against DDoS attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/","og_locale":"en_US","og_type":"article","og_title":"DDoS Attacks: Disabling Networks with Overwhelming Traffic","og_description":"A distributed denial-of-service (DDoS) attack. Learn about the types, motives, methods, and protection against DDoS attacks.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/","og_site_name":"eSecurity Planet","article_published_time":"2022-12-07T16:10:43+00:00","article_modified_time":"2023-07-31T20:57:23+00:00","og_image":[{"width":675,"height":700,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg","type":"image\/jpeg"}],"author":"Kihara Kimachia","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kihara Kimachia","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/"},"author":{"name":"Kihara Kimachia","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2567e99a9b3855ab24d4f920bf22a958"},"headline":"What Is a Distributed Denial of Service (DDoS) Attack?","datePublished":"2022-12-07T16:10:43+00:00","dateModified":"2023-07-31T20:57:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/"},"wordCount":1854,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg","keywords":["botnet","cybersecurity","DDOS","DDoS attacks","network security","security","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/","url":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/","name":"DDoS Attacks: Disabling Networks with Overwhelming Traffic","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg","datePublished":"2022-12-07T16:10:43+00:00","dateModified":"2023-07-31T20:57:23+00:00","description":"A distributed denial-of-service (DDoS) attack. Learn about the types, motives, methods, and protection against DDoS attacks.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/ddos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/DDoS-botnet.jpg","width":675,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Is a Distributed Denial of Service (DDoS) Attack?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2567e99a9b3855ab24d4f920bf22a958","name":"Kihara Kimachia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/kihara-kimachia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/kihara-kimachia-150x150.jpg","caption":"Kihara Kimachia"},"description":"eSecurity Planet contributor Kihara Kimachia has been a writer and digital marketing consultant for more than ten years. He has a degree in international business administration and is passionate about technology, writing for for several leading tech websites.","url":"https:\/\/www.esecurityplanet.com\/author\/kihara-kimachia\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25642"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/308"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25642"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25642\/revisions"}],"predecessor-version":[{"id":31267,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25642\/revisions\/31267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25644"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25642"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25642"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25642"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}