{"id":1657,"date":"2022-08-01T01:56:00","date_gmt":"2022-08-01T01:56:00","guid":{"rendered":"https:\/\/www.prolimehost.com\/blogs\/?p=1657"},"modified":"2022-08-01T16:36:59","modified_gmt":"2022-08-01T16:36:59","slug":"the-consequences-of-short-ddos-attacks-are-you-susceptible","status":"publish","type":"post","link":"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/","title":{"rendered":"The Consequences of Short DDoS Attacks"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter wp-image-1658\" src=\"https:\/\/www.prolimehost.com\/wp-content\/uploads\/sites\/4\/Cyber-Security-DDoS-Attacks-300x200.png\" alt=\"Cyber Security short DDoS Attacks\" width=\"611\" height=\"407\" srcset=\"https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/Cyber-Security-DDoS-Attacks-300x200.png 300w, https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/Cyber-Security-DDoS-Attacks-512x341.png 512w, https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/Cyber-Security-DDoS-Attacks.png 640w\" sizes=\"(max-width: 611px) 100vw, 611px\" \/>The WHIR ran an article years ago entitled, \u201cReport: <a href=\"https:\/\/www.corero.com\/blog\/the-dangers-of-short-duration-sub-saturating-ddos-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Short DDoS Attacks<\/a> Can Have Lasting Security Impact,\u201d in which they delved into the security risks of short DDoS (distributed denial of service) attacks.<\/p>\n<p>Typically, what we\u2019ll see on web hosting forums are OP\u2019s (original posters) asking about levels of protections. On the other side of the coin, what we see routinely advertised is either DDoS protection services citing no specifications or something like 20 Gbps protection. The prevailing trend is that more, for example, 50 Gbps protection is better, and it is for specific types of attacks, but not all.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#Has_your_business_been_the_victim_of_a_Trojan_Horse\" >Has your business been the victim of a Trojan Horse?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#Just_how_prevalent_are_these_types_of_attacks\" >Just how prevalent are these types of attacks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#Getting_in_and_out_avoiding_detection_%E2%80%93_the_reality_of_most_cloud_based_DDoS_solutions\" >Getting in and out avoiding detection \u2013 the reality of most cloud based DDoS solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#The_stakes_in_Europe_get_raised_this_upcoming_year\" >The stakes in Europe get raised this upcoming year<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#Ok_so_how_often_do_these_types_of_attacks_actually_occur\" >Ok, so how often do these types of attacks actually occur?<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#BROUGHT_TO_YOU_BY_PROLIMEHOST\" >BROUGHT TO YOU BY PROLIMEHOST<\/a><ul class='ez-toc-list-level-5' ><li class='ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#VPS_SERVICES_LIGHTNING_FAST_SSD_VIRTUAL_SERVERS\" >VPS SERVICES: LIGHTNING FAST SSD VIRTUAL SERVERS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.prolimehost.com\/blogs\/the-consequences-of-short-ddos-attacks-are-you-susceptible\/#DEDICATED_SERVERS_BACKED_BY_A_999_SLA_NETWORK_UPTIME_GUARANTEE\" >DEDICATED SERVERS: BACKED BY A 99.9% SLA NETWORK UPTIME GUARANTEE<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Has_your_business_been_the_victim_of_a_Trojan_Horse\"><\/span><strong><img decoding=\"async\" class=\"alignright size-medium wp-image-1660\" src=\"https:\/\/www.prolimehost.com\/wp-content\/uploads\/sites\/4\/Trojan-Horse-300x162.jpg\" alt=\"Trojan Horse\" width=\"300\" height=\"162\" srcset=\"https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/Trojan-Horse-300x162.jpg 300w, https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/Trojan-Horse-512x277.jpg 512w, https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/Trojan-Horse.jpg 640w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/strong>Has your business been the victim of a Trojan Horse?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>I\u2019ve never read any discussion of security risks posed by short DDoS attacks, which makes this article so interesting. As the article lays out, short, low-volume attacks can act as Trojan Horses, allowing cybercriminals to disseminate harmful malware.<\/p>\n<p>In this scenario, the goal of these types of attacks is to obstruct IPS (intrusion prevention systems) and firewalls, distracting that business\u2019s IT security personnel long enough for them to install their malware and pilfer their data.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Just_how_prevalent_are_these_types_of_attacks\"><\/span>Just how prevalent are these types of attacks?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>According to Corero, over 70% typically lasted under ten minutes and nearly the same percentage were under 1 Gbps. The reasoning for this is conjectured to be that these cybercriminals don\u2019t want to show their hands via large scale attacks that could cripple a website. Why not? It allows them an avenue to test for vulnerabilities at little risk of being detected.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Getting_in_and_out_avoiding_detection_%E2%80%93_the_reality_of_most_cloud_based_DDoS_solutions\"><\/span><strong><img decoding=\"async\" class=\"alignleft size-medium wp-image-1661\" src=\"https:\/\/www.prolimehost.com\/wp-content\/uploads\/sites\/4\/No-one-there-300x172.jpg\" alt=\"\" width=\"300\" height=\"172\" srcset=\"https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/No-one-there-300x172.jpg 300w, https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/No-one-there-512x293.jpg 512w, https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/No-one-there.jpg 640w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/strong>Getting in and out avoiding detection \u2013 the reality of most cloud based DDoS solutions<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The article points out that the majority of cloud-based protections won\u2019t even identify DDoS attacks lasting under ten minutes. The consequence? Cybercriminals are able to sow their damage, and get in and then back out without raising any eyebrows or security concerns. It\u2019s theorized that this tactic could be utilized as a testing ground preceding later full-scale attacks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"The_stakes_in_Europe_get_raised_this_upcoming_year\"><\/span>The stakes in Europe get raised this upcoming year<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Like everyone else who tracks these types of events, we\u2019ve become accustomed to hearing about breaches of security, but defending your business against data theft throughout Europe poses (potential) severe penalties per the EU\u2019s policy, GDPR.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Ok_so_how_often_do_these_types_of_attacks_actually_occur\"><\/span>Ok, so how often do these types of attacks actually occur?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>According to Corero, organizations are currently victims of these types of attacks, on average, four times a day. Think about that number for a second because it equates to almost 1500 attacks per year! And these types of attacks are growing every quarter. It\u2019s reported they grew by 9% every year, with the majority of those low in volume and short in duration. Conversely, attacks greater than 10 Gbps grow over fifty percent.<\/p>\n<h4><img decoding=\"async\" class=\"aligncenter size-full wp-image-51\" src=\"https:\/\/www.prolimehost.com\/wp-content\/uploads\/sites\/4\/2014\/08\/unnamed-e1408122780935.jpg\" alt=\"ProlimeHost\" width=\"400\" height=\"80\" srcset=\"https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/2014\/08\/unnamed-e1408122780935.jpg 400w, https:\/\/www.prolimehost.com\/blogs\/wp-content\/uploads\/sites\/4\/2014\/08\/unnamed-e1408122780935-300x60.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/h4>\n<h4><span class=\"ez-toc-section\" id=\"BROUGHT_TO_YOU_BY_PROLIMEHOST\"><\/span>BROUGHT TO YOU BY PROLIMEHOST<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>We\u2019ve been in the web hosting industry for over a decade, helping hundreds of clients succeed in what they do best and that\u2019s running their business. We specialize in Virtual Private Servers (VPS) and dedicated servers, with data centers in Los Angeles, Denver &amp; Singapore.<\/p>\n<h5><span class=\"ez-toc-section\" id=\"VPS_SERVICES_LIGHTNING_FAST_SSD_VIRTUAL_SERVERS\"><\/span>VPS SERVICES: LIGHTNING FAST SSD VIRTUAL SERVERS<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p>Our&nbsp;<a href=\"https:\/\/www.prolimehost.com\/ssd-vps-server\/\">Virtual Private Servers<\/a>&nbsp;all feature high performance Xeon processors and SSD storage in a RAID10 configuration to optimize your server\u2019s performance, which dramatically enhances visitor experiences on your site.<\/p>\n<p>That speed is backed by unparalleled 24\/7 support, featuring both outstanding response AND resolution times to maximize your uptime.<\/p>\n<p><strong><em>Now is the time to join the ProlimeHost virtual private server revolution.<\/em><\/strong><\/p>\n<h5><span class=\"ez-toc-section\" id=\"DEDICATED_SERVERS_BACKED_BY_A_999_SLA_NETWORK_UPTIME_GUARANTEE\"><\/span>DEDICATED SERVERS: BACKED BY A 99.9% SLA NETWORK UPTIME GUARANTEE<span class=\"ez-toc-section-end\"><\/span><\/h5>\n<p>We only use enterprise-class hardware in our&nbsp;<a href=\"https:\/\/www.prolimehost.com\/los-angeles-dedicated-servers\/\">dedicated servers<\/a>&nbsp;[1] and offer a four (4) hour hardware replacement. Throw in IPMI for remote management, support for public and private networks, free operating system (OS) re-installs, and SATA, SAS &amp; SSD (including NVMe) storage. Call 1-877-477-9454 or&nbsp;<a href=\"https:\/\/www.prolimehost.com\/contact\/\">contact us<\/a>&nbsp;[2]. For everything from gaming servers to&nbsp;<a href=\"https:\/\/www.prolimehost.com\/discounted-dedicated-server-deals\/\">cheap dedicated servers<\/a>, we\u2019re here to help.<\/p>\n<div class=\"abh_box abh_box_down abh_box_business\"><\/div>\n","protected":false},"excerpt":{"rendered":"The WHIR ran an article years ago entitled, \u201cReport: Short DDoS Attacks Can Have Lasting Security Impact,\u201d in&hellip;","protected":false},"author":3,"featured_media":1658,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[11,1,10],"tags":[],"class_list":{"0":"post-1657","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-around-the-web","8":"category-geneal","9":"category-tutorials-tips","10":"cs-entry"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/posts\/1657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/comments?post=1657"}],"version-history":[{"count":0,"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/posts\/1657\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/media\/1658"}],"wp:attachment":[{"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/media?parent=1657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/categories?post=1657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.prolimehost.com\/blogs\/wp-json\/wp\/v2\/tags?post=1657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}