Understanding and Responding to Distributed Denial-of-Service Attacks

Home / Articles / External / Government

Denial-of-service attacks are designed to shut down targeted websites. A formula known as Tsallis entropy helps to stop them (illustration by Nerza | Shutterstock.com).
Denial-of-service attacks are designed to shut down targeted websites. A formula known as Tsallis entropy helps to stop them (illustration by Nerza | Shutterstock.com).

March 25, 2024 | Originally published by CISA on March 21, 2024

This joint guide, Understanding and Responding to Distributed Denial-of-Service (DDoS) Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques:

  • Volumetric – attacks aiming to consume available bandwidth.
  • Protocol – attacks which exploit vulnerabilities in network protocols.
  • Application – attacks targeting vulnerabilities in specific applications or running services.

Focus Areas