How are DDoS attacks carried out?
DDoS attacks exploit the fundamental nature of Internet communication. When a client sends a request to a server, the server must process it and return a response. DDoS attacks abuse this process by flooding servers with more requests than they can handle.
DDoS attack tools
Attackers use various tools including botnets, IP spoofing, and amplification techniques. Booter and stresser services are commercially available DDoS-for-hire services that lower the barrier to launching attacks.
Legal consequences
Launching a DDoS attack is illegal in most jurisdictions. In the United States, DDoS attacks can be prosecuted under the Computer Fraud and Abuse Act (CFAA), carrying penalties of up to 10 years in prison.
Defending against DDoS attacks
Organizations protect themselves using DDoS mitigation services, rate limiting, traffic analysis, Web Application Firewalls, and Anycast network diffusion.