Can’t deny DDoS in 2024?

Reading time: 4 minutes

Category: Trends and Reports


It’s a typical Monday morning. You’re on your way to work, listening to your favorite new podcast, mentally preparing for the week ahead. Suddenly, you hit a massive traffic jam; not because of an accident or roadwork, but because someone intentionally dumped hundreds of empty boxes on the highway, blocking all lanes and preventing you from reaching your destination.

This is how Distributed-Denial-of-Service (DDoS) attacks work, except those take place on digital highways.

DDoS attacks are orchestrated efforts where malicious actors aim to disrupt the normal flow of traffic to a specific server, service, or entire network. They flood the target with a torrent of internet traffic—much like those empty boxes in our scenario—making it impossible for legitimate traffic to get through. These attacks can cripple websites, slow down services, or even bring them to a complete halt, affecting businesses and users alike.

Peter van Burgel is a thought leader on internet and internet technology and owns AMS-IX’ vision to “create a better society through better internet” and is the driving force behind several initiatives to make the internet more secure, safe, and sustainable.

DDoS attacks are becoming increasingly more frequent, and there doesn’t appear to be any signs of slowing down. Want to know how often these attacks really take place?

In this ‘Can’t deny DDoS in 2024?’ episode of our Threat Talks podcast, cybersecurity specialists Lieuwe Jan Koning and Luca Cipriano are joined by Peter van Burgel (CEO AMS-IX) to discuss the rise in DDoS attacks and dissect a number of recent DDoS specific vulnerabilities.

If you’re looking for insights in the type of DDoS attacks that are being used, expert opinions on the best prevention and remediation and much more, tune in for this episode of Threat Talks: Can’t deny DDoS in 2024?

P.S. Think you can spot the secret code in this episode? Join the treasure hunt, submit the code and win your very own Threat Talks t-shirt!

Want to find out more about the specifics of the threats mentioned in this Threat Talks episode? Join us for our deep dives, where we highlight three of the most recent and relevant DDoS threats and take a much more technical look at the how and what of these attacks. 

Mirai Botnet

The Mirai Botnet, with over 600,000 infected devices worldwide, has made headlines for disrupting major services like Deutsche Telekom, Twitter, and Amazon. This episode delves into the mechanics of Mirai Botnet, shedding light on its operational structure, the role of IoT devices in its spread, and the dangers posed by inadequate network security.

Lieuwe Jan Koning and Luca Cipriano explore the nuances of malware types, command and control servers, and how these malicious networks propagate.

Beyond just highlighting the issue, the episode also focuses on practical solutions. It underscores the importance of robust cybersecurity practices, such as the use of strong passwords, regular software updates to patch vulnerabilities, and a thorough understanding of network configurations. These strategies are crucial for defense against threats like Mirai Botnet.

As cyber threats evolve, understanding and preparing for key risks like Mirai Botnet becomes essential. But what sets Mirai Botnet apart as a significant threat, and why is it crucial to fortify defenses against it now?

Listen now to get answers!

Reflection attack: The most simple DoS attack

In this deep dive, Lieuwe Jan Koning, Rob Maas and Luca Cipriano zero in on DNS amplification and reflection attacks. Live from the ON2IT Security Operation Center, they unpack how attackers use these techniques to launch potent DoS attacks, sidestepping traditional defenses with chilling efficiency.

This deep dive starts with a discussion on how attackers exploit ordinary protocol functionalities to launch devastating assaults on unsuspecting victims. With no software vulnerabilities to patch, these attacks leverage the inherent design of protocols like DNS and NTP to magnify their impact.

From the theoretical ‘how-tos’ to the intricacies of mitigation, your hosts dissect the anatomy of reflection attacks, examining the roles of attacker, server, and victim in a digital skirmish.

Why is UDP the protocol of choice for such attacks? What can organizations do when facing the torrent of unwarranted network responses?

For answers to these and other more technical questions, tune in for this deep dive on reflection and amplification!

Follow our Threat Talks podcast

Stay up to date with the latest developments in the world of cybersecurity! Alongside industry experts, we explore recent cyber threats, what their impact was and how to prevent these threats in the future.