Distributed denial of service ( DDoS ), one of the oldest types of cyberthreats , continues to be a popular instrument of mass disruption , posing security risks for virtually every type of enterprise – small and large alike . In fact , according to IDC , DDoS attacks are expected to grow at an 18 % CAGR through 2023 , a clear indicator that it ’ s time to increase investment in robust mitigation controls . And while some organisations may believe they ’ re low-risk targets for a DDoS attack , the growing reliance on Internet connectivity to power businesscritical services and applications leaves everyone exposed to downtime and diminished performance – if infrastructure isn ’ t protected .
The size of DDoS attacks has been doubling every two years , and the complexity – the number and combination of attack vectors – is unprecedented . With application and network availability essential to Business Continuity , threat actors are incentivized to launch volumetric , protocol , and applicationlayer DDoS attacks to disrupt any potential point of failure , making Internet-facing resources and assets unavailable to end-users .
By conducting reconnaissance of these victim environments , applications , and IP spaces , attackers can determine which DDoS vectors will inflict the most potential damage on Internet-facing services and origin-hosting infrastructures . With a low barrier to entry , these threat actors have no shortage of attack techniques and tools ( think booters , DDoS for hire , etc .) to help discover weaknesses or vulnerabilities in enterprise defences . p
22 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com