Not only large but also medium-sized companies have long been the focus of cybercriminals. Particularly damaging to business are so-called DoS and DDoS attacks. The reason: You can put company websites in the shortest time out of action. It is, therefore, all the more important to use effective DDoS protection.
This article will tell you more about:
- Differences and characteristics of DoS and DDoS attacks
- DDoS protection and anti-DDoS tools
- Robustness of cloud platforms over DDoS
- Anti-DDoS features of the Open Telekom Cloud
- estimated reading time: 2.5 minutes
Why are DoS and DDoS attacks so dangerous?
The abbreviation “DoS” stands for “denial of service”, which means in German as “denial of service”. It can already be guessed, what is behind the dreaded DoS attack. The aim of a corresponding attack is to overload a server over the Internet in such a way that it ceases its service. The result: Web shops are no longer accessible to customers and the internal e-mail communication is paralyzed. DDoS attack results in an average downtime of 17 hours. This is an unacceptably long time span, especially for online shops, during which not only image losses but also significant business losses are threatening. In order to achieve this, hackers initiate a true bombardment of the target server as part of an attack – for example through faulty IP packets or countless calls to individual websites.
If the attack takes place coordinated from different computers with different IP address, one speaks of a DDoS attack (Distributed Denial of service attack). Often a DDoS attack takes place via a so-called botnet: A network of computers infected and connected by malicious software whose owners do not know about the infection.
Such an orchestrated attack is difficult to track. Thus, effective DDoS protection is much more difficult to achieve than simple DoS protection. In addition, the growing popularity of the “Internet of Things” makes it easier for cybercriminals to carry out such attacks.
Effective DDoS protection: Hard to afford from your own IT
Firewalls offer only limited protection against DDoS attacks. If the data volume of the attack is large enough, the company’s own IT usually faces powerless attack. There is hardly a way around professional DDoS protection. Anti-DDoS tools from specialized vendors such as Deutsche Telekom’s DDoS Defense effectively help prevent attacks and allow appropriate defenses to be taken in case of emergency.
Are cloud platforms particularly vulnerable to these attacks? Disenchanting a myth
There is still a rumor that cloud platforms are particularly vulnerable to DDoS attacks. Corresponding allegations, however, simply belong to the realm of legends. In contrast to most companies, public cloud providers have the know-how and resources to successfully counter DDoS attacks. The Open Telekom Cloud is no exception.
Anti-DDoS: What makes the Open Telekom Cloud so secure?
The Open Telekom Cloud is a prime example of effective DDoS protection. Extensive anti-DDoS tools and anti-DDoS policy packages minimize the harmful consequences of a DDoS attack. Good to know: The Anti-DDoS service is included in the Open Telekom Cloud – a real unique selling point among the Infrastructure-as-a-Service providers!