{"id":7170,"date":"2021-05-12T11:56:11","date_gmt":"2021-05-12T09:56:11","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=7170"},"modified":"2023-01-03T13:07:05","modified_gmt":"2023-01-03T12:07:05","slug":"how-can-you-protect-your-website-against-ddos-attacks","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/how-can-you-protect-your-website-against-ddos-attacks\/","title":{"rendered":"What is a DDoS attack, and how can I protect myself from it?"},"content":{"rendered":"<p>DDoS attacks can cause major economic damage and completely shut down websites. What is a DDoS attack? How can you protect your website against DDoS attacks and what measures does Combell take to address this issue?<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What is a DDoS attack?<\/h2>\n<h3 class=\"wp-block-heading\">(Distributed) Denial of Service-aanval<\/h3>\n<p>First, we need to explain what a <strong>DoS (Denial of Service) attack<\/strong> really entails. This is a situation where a computer system cannot provide the service that you are expecting as a user. This can happen due to an unintended error in the program, but usually these are situations where the access to servers, devices, services, networks, applications, or even specific transactions within applications is deliberately made impossible by e.g. computer hackers or activists.<\/p>\n<p>Where there is only one system with a DoS attack that carries out the attack, the attack with a <strong>DDoS (Distributed Denial of Service) attack<\/strong> will come from various systems.<\/p>\n<p>DoS and DDoS attacks have existed for more than 20 years. The first attack that made the papers goes back to the year 2000, when a student with the nickname <a href=\"https:\/\/nl.wikipedia.org\/wiki\/Michael_Calce\" target=\"_blank\" rel=\"noopener noreferrer\">Mafiaboy<\/a> managed to shut down sites like Amazon, CNN and eBay. In October 2016 an important provider of Internet infrastructure services, <a href=\"https:\/\/en.wikipedia.org\/wiki\/2016_Dyn_cyberattack\" target=\"_blank\" rel=\"noopener noreferrer\">Dyn DNS<\/a>, was hit by a DDoS attack, so services like Amazon, Netflix, Reddit, Spotify, Tumblr and Twitter were disrupted.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Requests<\/h3>\n<p>In concrete terms, the system that is being attacked is flooded by a huge amount of data requests. For example, a web server can receive so many requests to show a page that it cannot handle this and becomes unavailable. The target can also be a database, which must process so many queries that it cannot cope, slows down or even crashes. As a result, normal requests no longer reach the database or data server, and the user is not shown the desired information. Ultimately, the fake requests fully utilise the available bandwidth, CPU and RAM.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Too much traffic = traffic jam<\/h3>\n<p>During a DDoS attack, it is exactly as if countless people wanted to simultaneously visit a website or request something from a server. The only difference is that these people are not real persons, but rather 'bots' that are part of a botnet. Learn more about this below\u2026<\/p>\n<p>A DDoS attack can be compared to a traffic jam. If countless people suddenly decide to hit the motorway at once, all the vehicles will end up moving very slowly. And the same goes in the case of a DDoS attack: an attacker uses bots to obstruct the Internet traffic to your website.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1640\" height=\"636\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/An-attacker-uses-bots-to-clog-internet-traffic-to-your-website.png\" alt=\"An attacker uses bots to clog internet traffic to your website\" class=\"wp-image-9156\" title=\"An attacker uses bots to clog internet traffic to your website\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/An-attacker-uses-bots-to-clog-internet-traffic-to-your-website.png 1640w, https:\/\/www.combell.com\/en\/blog\/files\/An-attacker-uses-bots-to-clog-internet-traffic-to-your-website-300x116.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/An-attacker-uses-bots-to-clog-internet-traffic-to-your-website-1024x397.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/An-attacker-uses-bots-to-clog-internet-traffic-to-your-website-768x298.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/An-attacker-uses-bots-to-clog-internet-traffic-to-your-website-1536x596.png 1536w\" sizes=\"(max-width: 1640px) 100vw, 1640px\" \/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">The consequences of a DDoS attack<\/h2>\n<h3 class=\"wp-block-heading\">Hacking vs. DDoS attack<\/h3>\n<p>It is important to know that there is a difference between hacking and DDoS. Hacking usually involves a hacker stealing your sensitive or critical data in order to extort money from you or sell your data to other hackers.<\/p>\n<p>During a DDoS attack, your attacker floods your server with a massive amount of requests, but cannot access your secure data. Data theft is therefore usually not the reason behind such attacks: the attacker simply wants to cause you <strong>inconvenience<\/strong> by having your servers dramatically slow down.<\/p>\n<p>The main consequence of a DDoS attack is therefore that the target's systems become incredibly slow. And this can of course be quite problematic for companies or organisations whose applications and databases need to be easily accessible, such as banks or hospitals.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">What is the role of a Botnet in a DDoS attack?<\/h3>\n<p>The attacks, however, are becoming more powerful. At the end of the nineties, 150 requests per second were enough to crash a system. With the attack on DynDNS, this amount had grown to 1.2 TB of fake requests per second. The most severe DDoS attack to date was <a href=\"https:\/\/www.theverge.com\/2020\/6\/18\/21295337\/amazon-aws-biggest-ddos-attack-ever-2-3-tbps-shield-github-netscout-arbor\" target=\"_blank\" rel=\"noopener\">one launched against Amazon<\/a>, with traffic reaching a volume of 2.3TB (!) per second.<\/p>\n<p>The impressive amount of fake requests, originating from various sources, is only possible by using \u2018<strong>botnets<\/strong>\u2019. These are computer networks on which the hackers have installed software, unbeknown to the owner, which suddenly comes alive with the attack. These are also called <strong>zombie computers<\/strong>, who listen to the <strong>botnet-shepherd<\/strong>. For example, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)\" target=\"_blank\" rel=\"noopener noreferrer\">Mirai botnet<\/a> was used with the DynDNS attack, which worked with more than 100,000 IoT devices, IP cameras and printers included.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/What-is-a-ddos-botnet.jpg\" alt=\"What is a ddos botnet\" class=\"wp-image-9157\" width=\"500\" title=\"What is a ddos botnet\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/What-is-a-ddos-botnet.jpg 1202w, https:\/\/www.combell.com\/en\/blog\/files\/What-is-a-ddos-botnet-300x279.jpg 300w, https:\/\/www.combell.com\/en\/blog\/files\/What-is-a-ddos-botnet-1024x951.jpg 1024w, https:\/\/www.combell.com\/en\/blog\/files\/What-is-a-ddos-botnet-768x713.jpg 768w\" sizes=\"(max-width: 1202px) 100vw, 1202px\" \/><\/figure>\n<\/div>\n<p>Such botnets are cynically enough for sale or rent on the Dark web, ready to be used!<\/p>\n<p>If you would you like to find out more about the different types of DOS attacks (such as Syn Flood, UDP Flood, Ping of Death, etc.), this article published on <a href=\"https:\/\/www.esecurityplanet.com\/network-security\/types-of-ddos-attacks.html\" target=\"_blank\" rel=\"noopener noreferrer\">eSecurity<\/a> will introduce you to this dark world.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Who carries out DDoS attacks and why?<\/h2>\n<p>Why would someone carry out such an attack, you might wonder? The answers vary\u2026 Some do it \u2018just for fun\u2019, because they can; by doing so, they like to establish a reputation as a hacker. Others have downright criminal purposes, such as extortion. They attack a website and demand money to stop the attack. And with that one successful attack, they can threaten other companies: \u201cpay or the same will happen to you!\u201d It is a bit like mobsters and their \u2018protection money\u2019. These attacks may also involve individuals, with personal reasons, or a group. Government-sponsored attacks against systems of other countries are also possible.<\/p>\n<p>Your attacker may also be seeking to damage your reputation, or may not agree with the ideas being promoted by your company or government. There have even been cases of DDoS attacks against college websites. Perhaps it was the work of a student who did not feel like going to class on a Friday morning <img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.0.1\/svg\/1f609.svg\" alt=\"\ud83d\ude09\">?<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What does Combell do to protect you against DDoS attacks?<\/h2>\n<p>To start with, Combell has a major advantage: <strong>its network is very extensive<\/strong>. Where attacks on servers with smaller hosting companies would immediately bog down the network, the traffic of the fake requests can be distributed across the large network at Combell. Imagine a single lane, which is suddenly overwhelmed by a lot of traffic so the traffic stops completely, and then a road with 100 lanes, that can smoothly process the increased traffic. In other words, capacity is a key factor.<\/p>\n<p>Furthermore, Combell has implemented <strong>different defence mechanisms <\/strong>to detect DDoS attacks in time and to respond immediately. An additional option that Combell offers you, is our automatic&nbsp;<em>scrubbing service<\/em>.&nbsp;With this, we check all the traffic that comes into our systems. If any incoming request smells like DDoS, we immediately redirect it. This way, legitimate traffic can continue to get through smoothly, while the 'bad' traffic is 'stuck' somewhere else and does not inconvenience anyone. This way, even if a DDoS attack is underway, your visitors will still be able to access your website or application without any problems.<\/p>\n<p>In the video below, one of our Chief Technology Officers, Wesley, explains what Combell does to counter DDoS attacks.<\/p>\n<figure class=\"wp-block-embed alignwide is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Kanaal Z reportage over DDoS-aanvallen: Hoe Combell haar klanten beschermt\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Hye9vk17UKg?feature=oembed&hl=en&cc_lang_pref=en&cc_load_policy=1&modestbranding=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<\/figure>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-a0590edc uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Read more:<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/how-does-combell-protect-you-against-ddos-attacks\/\">How Combell protects you against DDoS attacks<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Protection against DDoS attacks is only one of the security measures taken by Combell<\/h2>\n<p>Conclusion: the economic damage that is caused when a website or web service is temporarily unavailable as a result of a DDoS attack can be enormous. The technology of DDoS attacks is coming more and more advanced and requires an increasing higher level of vigilance and protection against the attacks. The experienced <strong>collaborators of Combell closely follow these developments<\/strong> and apply the latest defence mechanism as soon as possible. So, you can be assured that your website will remain available.<\/p>\n<div style=\"height:5px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Combell Shield<\/h3>\n<p>In addition, Combell also takes many measures to guarantee the protection of your website or services in all other areas. This way, the people who use our <a href=\"https:\/\/www.combell.com\/en\/hosting\/web-hosting\">web hosting<\/a>\u00a0can be safe behind our Combell Shield, which is a collection of defence systems.<strong><br \/><\/strong><\/p>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-7d621a43 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Also discover<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/how-combell-shield-protects-webhosting-customers\/\">More about our <strong>Combell Shield<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Service Level Agreement<\/h3>\n<p>You can also rely on the special protection mechanisms offered by Combell for other hosting services, such as tailored managed hosting. In your Service Level Agreement, you can also include options like security audits, security tests and stress tests. <a href=\"https:\/\/www.combell.com\/en\/sla-guarantees\" target=\"_blank\" rel=\"noopener noreferrer\">Check out the options available with our SLAs<\/a>.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Physical protection<\/h3>\n<p>And last but not least, the final piece of this protection is the Tier 3+ <a href=\"https:\/\/www.combell.com\/en\/blog\/first-class-hosting-starts-from-the-data-centre\/\" target=\"_blank\" rel=\"noopener noreferrer\">data centre where your hosting is located<\/a>. Not only is it a robust building, resistant to water, fire and power failures, but it is also strictly guarded. In addition to the strict access control system, the data centre features 24\/7 physical security and continuous video surveillance.<\/p>\n<p><strong>You can rest easy, Combell stands guard \ud83d\ude09!<\/strong><\/p>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\"> Frequently asked questions <\/h2>\n<div class=\"wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-3e2e137f uagb-faq-icon-row uagb-faq-layout-accordion uagb-faq-expand-first-false uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height\" data-faqtoggle=\"true\" role=\"tablist\"><script type=\"application\/ld+json\">{\"@context\":\"https:\/\/schema.org\",\"@type\":\"FAQPage\",\"@id\":\"https:\/\/www.combell.com\/en\/blog\/how-can-you-protect-your-website-against-ddos-attacks\/\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\" What is the purpose of a DDoS attack?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\" A DDoS attack can seriously affect the performance of your website. Those who launch DDoS attacks are therefore mainly seeking to damage your reputation by slowing down your website or services, or by bringing them down altogether. \"}},{\"@type\":\"Question\",\"name\":\"  How can you prevent a DDoS attack?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A DDoS attack is impossible to prevent, but it is possible to arm yourself to minimise the consequences. Combell makes sure, for example, that its servers have enough capacity, so that you, the victim, do not notice a thing.&lt;br>&lt;br>&lt;a href=\\\"https:\/\/www.combell.com\/en\/blog\/how-does-combell-protect-you-against-ddos-attacks\/\\\">Read more about our protection against DDoS attacks&lt;\/a>\"}},{\"@type\":\"Question\",\"name\":\"  How long does a DDoS attack last?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The duration of DDoS attacks varies from case to case. Typically, they last for a few hours, but they can also last for days: the longest DDoS attack ever recorded lasted for 509 hours, which is almost 21 (!) days. In early 2021, 90% of attacks lasted for less than four hours. \"}},{\"@type\":\"Question\",\"name\":\"  What is denial of service?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Denial of Service' means that a computer system cannot provide the services that you as a user expect from it. This may be due to an unintentional error in a program, but more often than not, you will not be able to access servers or applications due to an interference from the outside. \"}},{\"@type\":\"Question\",\"name\":\"  What is a DDoS attack and why do such attacks happen?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"During a DDoS attack, it is exactly as if innumerable people wanted to visit a website or request something from a server at the same time, thereby slowing down the server or causing it to crash. Except that these people are not real, as they are actually 'bots', used by a rogue attacker. This kind of attack, however, does not allow the attacker to access your data.&lt;br>&lt;br>The reasons behind DDoS attacks are diverse and range from causing reputational damage to demanding a ransom to stop the attack.\"}}]}<\/script><\/p>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-4bd6ead4\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\"> What is the purpose of a DDoS attack?<\/h4>\n<\/div>\n<p class=\"uagb-faq-content\"> A DDoS attack can seriously affect the performance of your website. Those who launch DDoS attacks are therefore mainly seeking to damage your reputation by slowing down your website or services, or by bringing them down altogether. <\/p>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-6eba95f4\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">  How can you prevent a DDoS attack?<\/h4>\n<\/div>\n<p class=\"uagb-faq-content\">A DDoS attack is impossible to prevent, but it is possible to arm yourself to minimise the consequences. Combell makes sure, for example, that its servers have enough capacity, so that you, the victim, do not notice a thing.<\/p>\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/how-does-combell-protect-you-against-ddos-attacks\/\">Read more about our protection against DDoS attacks<\/a><\/p>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-be108040\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">  How long does a DDoS attack last?<\/h4>\n<\/div>\n<p class=\"uagb-faq-content\">The duration of DDoS attacks varies from case to case. Typically, they last for a few hours, but they can also last for days: the longest DDoS attack ever recorded lasted for 509 hours, which is almost 21 (!) days. In early 2021, 90% of attacks lasted for less than four hours. <\/p>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-3aaaafd7\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">  What is denial of service?<\/h4>\n<\/div>\n<p class=\"uagb-faq-content\">Denial of Service' means that a computer system cannot provide the services that you as a user expect from it. This may be due to an unintentional error in a program, but more often than not, you will not be able to access servers or applications due to an interference from the outside. <\/p>\n<\/div>\n<div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-6bce0b2b\" role=\"tab\" tabindex=\"0\">\n<div class=\"uagb-faq-questions-button uagb-faq-questions\"><span class=\"uagb-icon uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg><\/span><span class=\"uagb-icon-active uagb-faq-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg><\/span><\/p>\n<h4 class=\"uagb-question\">  What is a DDoS attack and why do such attacks happen?<\/h4>\n<\/div>\n<p class=\"uagb-faq-content\">During a DDoS attack, it is exactly as if innumerable people wanted to visit a website or request something from a server at the same time, thereby slowing down the server or causing it to crash. Except that these people are not real, as they are actually 'bots', used by a rogue attacker. This kind of attack, however, does not allow the attacker to access your data.<\/p>\n<p>The reasons behind DDoS attacks are diverse and range from causing reputational damage to demanding a ransom to stop the attack.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>DDoS attacks can cause major economic damage and completely shut down websites. What is a DDoS attack? How can you protect your website against DDoS attacks and what measures does...<\/p>\n","protected":false},"author":1,"featured_media":7750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[61,62],"tags":[442,387,41],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-1024x358.jpg",1024,358,true],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/DDoS-Protection-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Combell","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/blogadmin\/"},"uagb_comment_info":0,"uagb_excerpt":"DDoS attacks can cause major economic damage and completely shut down websites. What is a DDoS attack? How can you protect your website against DDoS attacks and what measures does...","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7170"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=7170"}],"version-history":[{"count":9,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7170\/revisions"}],"predecessor-version":[{"id":10298,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7170\/revisions\/10298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/7750"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=7170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=7170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=7170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}