Standing strong against hyper-volumetric DDoS attacks


As digital innovation accelerates, so does the scale and sophistication of cyber threats, particularly Distributed Denial of Service (DDoS) attacks. Hyper-volumetric DDoS attacks, which overwhelm systems with floods of traffic, are growing in both frequency and complexity. According to our research, more than a third (37%) of European businesses have experienced such an attack within the last year.
While disruptive in their own right, these attacks can also serve as a smokescreen for more targeted incidents, such as SQL injection attacks. While security teams tackle the immediate chaos of the DDoS attack, malicious actors can exploit unnoticed vulnerabilities.
Recently, Cloudflare mitigated a record-breaking DDoS attack peaking at 5.6 Tbps – the largest publicly disclosed attack ever. This came after a 3.6 Tbps attack earlier in the same campaign, which targeted industries such as finance, telecoms, and internet service providers. Spanning an entire month, the campaign consisted of over 100 individual incidents, many exceeding 3 Tbps in volume.
For industries that depend on real-time operations, even brief downtime can cause significant financial and reputational damage. The stakes are high, and organizations that aren’t prepared face catastrophic consequences.
Field CTO, EMEA, Cloudflare.
A global challenge in the age of IoT
The proliferation of Internet of Things (IoT) devices has introduced new vulnerabilities into enterprise environments. These devices often comprise of security measures, including factory default usernames and passwords, while remaining constantly connected online. This creates the perfect environment for attackers to assemble botnets capable of launching large-scale, anonymous cyberattacks. Exacerbating the issue is the global distribution of these devices, making it harder to predict when or where the next attack will occur.
Recent attacks, such as the Mozi and HTTP/2 vulnerabilities originated from compromised devices in nations including the US, Russia, Brazil, and Vietnam. In these attacks, botnets composed of hijacked routers, webcams, and servers enabled attackers to strike from virtually anywhere. This global, decentralized nature of modern threats demands that organizations rethink and evolve their cybersecurity strategies.
Today’s attackers increasingly blend volumetric attacks with application-layer exploits, targeting specific system vulnerabilities. These multi-pronged tactics make detection and mitigation more complex, as various layers of an organization’s IT infrastructure can be attacked simultaneously. To counter these challenges, businesses must adopt a comprehensive approach to security. Monitoring both network infrastructure and application layers is critical to identifying and addressing vulnerabilities before hackers can exploit them.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Defending against the evolving threat
Speed and precision are essential when identifying and mitigating today’s DDoS attacks. Automated systems powered by real-time machine learning and artificial intelligence have become indispensable. These technologies enable organizations to detect and neutralize threats, analyze traffic patterns, and respond instantly without human intervention. This approach means that organizations are able to prevent attacks before they have even begun – bolstering their preventative security measures further than just fighting them in real time.
Automation is a vital tool, but it’s only one piece of the puzzle. A truly effective defense requires a multi-layered security strategy that combines advanced traffic filtering, real-time analytics, and actionable threat intelligence. These systems work together to differentiate legitimate traffic from malicious activity, allowing businesses to maintain continuity without compromising performance, reliability or security. It is also important for organisations to regularly review and test their incident response plans, ensuring teams are well-prepared for real-world scenarios.
A global, high capacity, anycast network is another powerful tool in the fight against high-volume attacks. By dispersing traffic across multiple data centers worldwide, this approach ensures no single location bears the brunt of an attack, minimizing downtime and maintaining service continuity. For example, a connectivity cloud can absorb and reroute massive traffic surges through its distributed infrastructure, providing seamless, scalable protection against even the largest DDoS campaigns.
Cloud computing services also play a critical role, acting as a buffer to absorb the impact of large-scale attacks that traditional on-premises systems cannot handle. However, organizations must carefully evaluate their providers’ DDoS protection capabilities to ensure they can withstand the escalating scale of threats.
Building a resilient future
The threat of hyper-volumetric DDoS attacks is not going away. Nearly two-thirds (64%) of European business and technology leaders believe a cybersecurity incident is likely within the next year, reflecting growing concern over the evolving threat landscape.
By leveraging global infrastructure, automating defenses, and layering security strategies, organizations can build the resilience needed to face these challenges. Equally important is fostering a culture of security awareness and staying informed about emerging threats.
Cyber Resilience in the face of DDoS attacks will be a defining trait of successful organizations in the coming years. By adopting advanced tools, embracing Zero-Trust strategies, and continuously refining their cybersecurity posture, businesses can protect their systems and adapt to an ever-changing threat landscape.
We’ve compiled a list of the best network monitoring tools.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
As digital innovation accelerates, so does the scale and sophistication of cyber threats, particularly Distributed Denial of Service (DDoS) attacks. Hyper-volumetric DDoS attacks, which overwhelm systems with floods of traffic, are growing in both frequency and complexity. According to our research, more than a third (37%) of European businesses have…
Recent Posts
- Quordle hints and answers for Wednesday, February 19 (game #1122)
- Facebook is about to mass delete a lot of old live streams
- An obscure French startup just launched the cheapest true 5K monitor in the world right now and I can’t wait to test it
- Google Meet’s AI transcripts will automatically create action items for you
- No, it’s not an April fool, Intel debuts open source AI offering that gauges a text’s politeness level
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010