

including Internet of Things (IoT) devices, smartphones, personal computers, and network servers to send a flood of traffic to targets.ĭDoS attacks exploit networks of internet-connected devices to cut off users from a server or network resource, such as a website or application they may frequently access. But instead of zombies, hordes of infected computers go after a targeted website, all at the same time - driving humans and business away.Ī DDoS attack on a company’s website, web application, APIs, network, or data center infrastructure can cause downtime and prevent legitimate users from buying products, using a service, getting information, or any other access.ĭuring a DDoS attack, attackers use large numbers of exploited machines and connected devices across the internet. That’s what a DDoS attack is like: a zombie apocalypse online. Then, inevitably, there’s a giant traffic jam sprawling as far as the eye can see, as people flee for safety on the highway.

Swarms of infected creatures all with the same goal - to overwhelm civilization as they spread their “zombie plague.” They swamp the resources of law enforcement organizations, deplete military forces, and take down healthcare services. In a distributed denial-of-service (DDoS) attack, an attacker overwhelms its target with unwanted internet traffic so that normal traffic can’t reach its intended destination.īut what does that really mean? Imagine your favorite zombie movie.
