{"id":12860,"date":"2020-06-11T14:40:30","date_gmt":"2020-06-11T18:40:30","guid":{"rendered":"https:\/\/www.hostdime.com\/blog\/?p=12860"},"modified":"2020-06-11T14:40:03","modified_gmt":"2020-06-11T18:40:03","slug":"ddos-attack-mitigation","status":"publish","type":"post","link":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/","title":{"rendered":"The Current State of DDoS Attacks and How To Mitigate Them"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png\" alt=\"ddos attack mitigation\" width=\"500\" height=\"364\" class=\"aligncenter size-full wp-image-11985\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png 500w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2-300x218.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>This article will explain why DDoS attack mitigation is a necessity for enterprises looking to protect themselves. We&#8217;ll take a look at the past, present, and future of DDoS, and how you can navigate these attacks to not lose your organization money. <\/p>\n<p>The first DDoS attack occurred in 1997 during a DEF CON event in Las Vegas. The culprit was notorious hacker Khan C. Smith, who successfully shut down Internet access on the Vegas Strip for over an hour. The release of some of this code opened up a can of worms and soon led to online attacks against Sprint, EarthLink, E-Trade, and many more corporations. Later in 2001, Smith would go on to create the first botnet, which was responsible for 25% of the entire Internet spam at the time.   <\/p>\n<p>Fast forward two decades later to March 5, 2018, where an unnamed customer, with the help of NETSCOUT (formerly Arbor Networks), battled the largest DDoS in history, reaching a peak of about 1.7 terabits per second. This broke the previous record, which occurred just 3 days earlier, where GitHub was knocked down by a 1.35 terabit per second attack. Before 2018, there was never an attack higher than a terabit. <\/p>\n<p>DDoS attacks have been around almost as long as the Internet, yet enterprises are not only struggling to protect themselves, but encountering attacks the breadth of which has never been seen. It&#8217;s no longer a matter of if your business will fall victim, but when. So what happens now?<\/p>\n<p>&nbsp;<br \/>\n<center><\/p>\n<h2>The Current State of DDoS Attacks<\/h2>\n<p><\/center><\/p>\n<p><strong>Memcached Servers Help Create Largest DDoS Attack Ever:<\/strong> That GitHub attack originated from over a thousand different systems across tens of thousands of different endpoints. This was an amplification attack using the memcached-based approach. Memcached is free software that speeds up database-driven websites by caching data in RAM to reduce disk strain. <\/p>\n<p>Hackers exploited a UDP vulnerability and ended up flooding valid requests to an exposed Memcached server. This attack has a 10,000:1 amplification ratio, so on average, every byte an attacker sent to the exposed Memcached server, the server would then send 10 KB to the actual victim.<\/p>\n<p>Here at <a href=\"https:\/\/hostdime.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">HostDime<\/a>, we saw evidence that servers on our network could be directly affected and immediately blocked all packets with a UDP destination port of 11211 from entering our networks.<br \/>\n&nbsp; <\/p>\n<p><strong>DDoS Attacks Growing in Quantity and Quality:<\/strong> It was all bad news in Q1 2020. While humanity continues to deal with the coronavirus pandemic, hackers did not take a break. Q1 2020 saw a huge increase in both size and total number of attacks. There was a significant rise in the length of these incidents, in both average and maximum duration. The amount of attacks actually doubled versus Q4 2019, and 80% higher than Q1 2019. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2020-06-10-at-3.52.41-PM.png\" alt=\"ddos attack mitigation\" width=\"817\" height=\"459\" class=\"aligncenter size-full wp-image-14592\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2020-06-10-at-3.52.41-PM.png 817w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2020-06-10-at-3.52.41-PM-300x169.png 300w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2020-06-10-at-3.52.41-PM-768x431.png 768w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><br \/>\n&nbsp; <\/p>\n<p><strong>It&#8217;s Costly to Get Attacked:<\/strong> How much money should a business expect to lose when they\u2019re hit with a DDoS attack? DDoS defense company Corero Network Security sought to answer that question and <a href=\"https:\/\/www.corero.com\/resources\/reports\/impact-of-ddos-on-enterprise-organizations\/\" rel=\"noopener noreferrer\" target=\"_blank\">polled<\/a> 300 security professionals from cloud, government, finance, media, and online gaming. Here are the not-so-uplifting findings:<\/p>\n<ul>\n<li>91% of those surveyed said that DDoS attacks can cost their organizations up to $50,000.<\/li>\n<li>85% believe that DDoS attacks are used by attackers as a precursor or smokescreen for data breach activity.<\/li>\n<li>71% reported that their organization has experienced a ransom-driven DDoS attack.<\/li>\n<li>78% cited the number one most damaging effect of a DDoS attack is the loss of customer trust.<\/li>\n<\/ul>\n<p>While not all DDoS attacks are going to cost 5 figures, what may be worse is having your website inaccessible and ruining customer confidence. A company&#8217;s reputation can be linked to corporate profits.<br \/>\n&nbsp; <\/p>\n<p><center><\/p>\n<h2>What&#8217;s Next?<\/h2>\n<p><\/center><\/p>\n<p><strong>Rise of the IoT Botnets:<\/strong> What a world we live in when your refrigerator is hackable. Khan C. Smith&#8217;s spammy e-mail botnet has evolved into an Internet of Things botnet that shows no signs of stopping. Here&#8217;s Guy Rosefelt of cloud security company NSFOCUS on his main IoT security concern: <\/p>\n<blockquote><p>\u201cAs IoT innovation continues to blossom, more and more IoT devices will continue to get involved in DDoS attacks. Routers and cameras are the major types of IoT devices involved in DDoS attacks, with routers making up 69.7% of IoT devices exploited to launch DDoS attacks, and 24.7% of cameras. This is because a great number of routers and web cameras have been introduced into production and living environments, with no sufficient security measures enforced. We have every reason to believe that attacks leveraging the IoT will become more diverse in the future.\u201d<\/p><\/blockquote>\n<p>As these IoT devices become outdated, vulnerabilities will surface and become an easily exploitable weapon. These devices take much longer to patch than Operating Systems, so these attacks often last longer. <\/p>\n<p>Thanks to information and the below graphic from <a href=\"https:\/\/securelist.com\/ddos-report-in-q3-2018\/88617\/\" rel=\"noopener noreferrer\" target=\"_blank\">Kaspersky Lab<\/a>, we can see the US leads the world in botnets, with Russia in second. More countries&#8217; botnets are being exploited like never before, as hackers aim for geographic redundancy. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-03-at-5.37.54-PM.png\" alt=\"\" width=\"808\" height=\"606\" class=\"aligncenter size-full wp-image-12873\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-03-at-5.37.54-PM.png 808w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-03-at-5.37.54-PM-300x225.png 300w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-03-at-5.37.54-PM-768x576.png 768w\" sizes=\"auto, (max-width: 808px) 100vw, 808px\" \/><br \/>\n&nbsp; <\/p>\n<p><strong>The CoAP Protocol:<\/strong> Oh fun, another amplification attack is here. CoAP, or the Constrained Application Protocol, can be thought of as a layer on top of the Internet of Things that handles congestion control. The CoAP protocol is a newish breakthrough that plays a role in speedy machine to machine communication among both consumer and industrial applications. However, with this newness and lightweight protocol, comes a chance at exploitation. <\/p>\n<p>CoAP uses UDP, which like the memcached servers, is vulnerable to the type of IP spoofing and packet amplification that enable large DDoS attacks. As aforementioned, this can cause huge amplification attacks spoofing 10 to 50x the normal amount of traffic. <\/p>\n<p>CoAP devices have become all the rage lately, going from 6,500 devices in November 2017 to now over 600,000! ZDNet has <a href=\"https:\/\/www.zdnet.com\/article\/the-coap-protocol-is-the-next-big-thing-for-ddos-attacks\/\" rel=\"noopener noreferrer\" target=\"_blank\">recently reported<\/a> from an anonymous source that over half of these devices could be used in DDoS amplification attacks and attacks have already begun, with increasing frequency and size.   <\/p>\n<p>This won&#8217;t be an easy fix, as we are accustomed to speed, especially with the IoT, and it looks like we will have to sacrifice some of the speed for security, or perhaps stop using these CoAP devices altogether. <\/p>\n<p>Pro tip to anyone with IoT devices in their home or office. While it&#8217;s not much, be sure to change the default username and password, and be on the lookout for suspicious activity and patch updates. There seems to be a shift to using outdated devices to launch these attacks. Let&#8217;s hope this isn&#8217;t what the near future looks like:<br \/>\n&nbsp; <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/0_0cs5Az3n_Q6-yH8g.png\" alt=\"\" width=\"700\" height=\"610\" class=\"aligncenter size-full wp-image-12881\" \/><br \/>\n&nbsp; <\/p>\n<p><center><\/p>\n<h2>DDoS Attack Mitigation Services<\/h2>\n<p><\/center><\/p>\n<p>Do you have the latest DDoS fighting tools and technologies ready for 2020? You can\u2019t predict how large an attack against your server will be, however you can choose what protection you need based on how mission critical your operations are.<\/p>\n<p>HostDime\u2019s secure network is among the most DDoS protected in the infrastructure industry. That&#8217;s because we offer <a href=\"https:\/\/www.hostdime.com\/services\/ddos-protection\/\" rel=\"noopener noreferrer\" target=\"_blank\">three types of DDoS protection<\/a>: NETSCOUT\u2019s local inline mitigation, a cloud-based traffic scrubbing service, and a combination of the two with our hybrid protection. <\/p>\n<p>The NETSCOUT appliance sits within our facility for inline protection. When the appliance detects irregular traffic, our team moves the affected subnet and begins filtering. With our Cloud Scrubbing service, ALL traffic gets filtered through one of our various GRE tunnels. Our Hybrid DDoS is unique for its performance based, &#8220;always on&#8221; protection. Read on for a more in-depth look at the intricacies of each service.<\/p>\n<p><center><\/p>\n<h2><a href=\"https:\/\/www.hostdime.com\/services\/ddos-protection\/#inline-protection\" rel=\"noopener noreferrer\" target=\"_blank\">Inline DDoS Protection<\/a><\/h2>\n<p><\/center><\/p>\n<p>HostDime offers premium hardware-based DDoS monitoring and mitigation, while most service providers offer reverse proxy DDoS detection. The problem with this is your traffic goes to a third party, is cleaned, then re-routed back to your host. <\/p>\n<p>Our DDoS protection is different because it\u2019s inline, or actually within the data center. We take both your affected and unaffected traffic, filter out the bad stuff, and leave only legitimate traffic flowing to and from your server. Once a server is placed behind our DDoS protection hardware, it learns \u201cnormal\u201d traffic patterns so it can identity bad traffic in the future. Therefore end users notice no added latency, even when active mitigation is taking place. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/Screen-Shot-2014-06-06-at-2.38.28-PM.png\" alt=\"inline ddos protection\" width=\"526\" height=\"290\" class=\"aligncenter size-full wp-image-11585\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/Screen-Shot-2014-06-06-at-2.38.28-PM.png 526w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/Screen-Shot-2014-06-06-at-2.38.28-PM-300x165.png 300w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" \/><br \/>\n&nbsp; <\/p>\n<p><center><\/p>\n<h2><a href=\"https:\/\/www.hostdime.com\/services\/ddos-protection\/#cloud-protection\" rel=\"noopener noreferrer\" target=\"_blank\">Cloud DDoS Protection<\/a><\/h2>\n<p><\/center><\/p>\n<p>HostDime\u2019s DDoS Cloud Scrubbing is a IP routing service where all traffic is examined and filtered, then the cleaned traffic is forwarded to our enterprise network via our Generic Routing Encapsulation (GRE) tunnels. This security cloud is a private point-to-point link between network nodes, and acts as our safety net if a large DDoS attack occurs. Your whole critical infrastructure is safe with this protection.<\/p>\n<p>Here is a visual depicting how HostDime\u2019s global security cloud delivers clean traffic to a visitor accessing a DDoS affected website. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/scrubbing-traffic-1024x428.png\" alt=\"ddos scrubbing\" width=\"1024\" height=\"428\" class=\"aligncenter size-large wp-image-11586\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/scrubbing-traffic-1024x428.png 1024w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/scrubbing-traffic-300x125.png 300w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/scrubbing-traffic-768x321.png 768w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2017\/12\/scrubbing-traffic.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>All IP addresses routed through our scrubbing centers are protected against DDoS attacks. The always active service uses network sensor devices to immediately detect suspicious patterns. Traffic toward that IP is then redirected for mitigation in our security cloud. Redirection stops minutes after the attack ends. HostDime\u2019s DDoS protected GRE tunnels can clean an attack up to 100Gbps; that&#8217;s an impressive amount of scrubbing power.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/12\/what-we-do_dashboard_image4.jpg\" alt=\"ddos attack mitigation\" width=\"875\" height=\"600\" class=\"aligncenter size-full wp-image-12863\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/12\/what-we-do_dashboard_image4.jpg 875w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/12\/what-we-do_dashboard_image4-300x206.jpg 300w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/12\/what-we-do_dashboard_image4-768x527.jpg 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><br \/>\n&nbsp; <\/p>\n<p><center><\/p>\n<h2><a href=\"https:\/\/www.hostdime.com\/services\/ddos-protection\/#hybrid-cloud-protection\" rel=\"noopener noreferrer\" target=\"_blank\">Hybrid DDoS Protection<\/a><\/h2>\n<p><\/center><\/p>\n<p>Lastly, HostDime&#8217;s Hybrid DDoS Protection gives clients the best of both worlds with a performance based option with &#8220;always on&#8221; protection. This unique set-up combines the inline DDoS protection appliance with the DDoS cloud filtering service. This protection detects and acts immediately against all sorts of large and complex attacks. When disruption occurs, clean traffic still gets through thanks to the cloud scrubbing. One difference between this service and the cloud scrubber is added latency when in protection mode.<br \/>\n&nbsp; <\/p>\n<p>The following chart spells out the differences between the three DDoS protection services. Whichever you choose, enjoy peace of mind knowing your business will have superior uptime, uninterrupted data center access, and relief from network security threats.<\/p>\n<p><a href=\"https:\/\/www.hostdime.com\/services\/ddos-protection\/\" rel=\"noopener noreferrer\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-04-at-2.39.10-PM.png\" alt=\"\" width=\"1154\" height=\"707\" class=\"aligncenter size-full wp-image-12893\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-04-at-2.39.10-PM.png 1154w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-04-at-2.39.10-PM-300x184.png 300w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-04-at-2.39.10-PM-768x471.png 768w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-04-at-2.39.10-PM-1024x627.png 1024w\" sizes=\"auto, (max-width: 1154px) 100vw, 1154px\" \/><\/a><\/p>\n<p>HostDime&#8217;s inline DDoS service is included on all <a href=\"https:\/\/www.hostdime.com\/managed-dedicated-servers\/\" rel=\"noopener noreferrer\" target=\"_blank\">managed dedicated servers<\/a>, but if you require additional protection, <a href=\"https:\/\/chat.hostdime.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">contact us now<\/a> to figure out the right plan for you. We offer both monthly and on-demand packages, featuring over 5GBPS of attack protection if necessary. Currently, only dedicated server and colocation clients can take advantage of these additional DDoS protection services.<\/p>\n<p>Stay safe out there!<\/p>\n<p>[divider]<\/p>\n<p>Jared Smith is HostDime&#8217;s Content &#038; SEO Strategist. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>DDoS attack mitigation is a necessity for enterprises looking to protect themselves. 91% of those surveyed said that DDoS attacks can cost them up to $50,000.<\/p>\n","protected":false},"author":13,"featured_media":11985,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-12860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Current State of DDoS Attacks and How To Mitigate Them<\/title>\n<meta name=\"description\" content=\"DDoS attack mitigation is a necessity for enterprises looking to protect themselves. 91% of those surveyed said DDoS attacks can cost them up to $50,000.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Current State of DDoS Attacks and How To Mitigate Them\" \/>\n<meta property=\"og:description\" content=\"DDoS attack mitigation is a necessity for enterprises looking to protect themselves. 91% of those surveyed said DDoS attacks can cost them up to $50,000.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/\" \/>\n<meta property=\"og:site_name\" content=\"HostDime Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hostdime\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-11T18:40:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-11T18:40:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"364\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jared Smith\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jared Smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/\"},\"author\":{\"name\":\"Jared Smith\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503\"},\"headline\":\"The Current State of DDoS Attacks and How To Mitigate Them\",\"datePublished\":\"2020-06-11T18:40:30+00:00\",\"dateModified\":\"2020-06-11T18:40:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/\"},\"wordCount\":1707,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/\",\"url\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/\",\"name\":\"The Current State of DDoS Attacks and How To Mitigate Them\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png\",\"datePublished\":\"2020-06-11T18:40:30+00:00\",\"dateModified\":\"2020-06-11T18:40:03+00:00\",\"description\":\"DDoS attack mitigation is a necessity for enterprises looking to protect themselves. 91% of those surveyed said DDoS attacks can cost them up to $50,000.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage\",\"url\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png\",\"contentUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png\",\"width\":500,\"height\":364,\"caption\":\"ddos attack mitigation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostdime.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Current State of DDoS Attacks and How To Mitigate Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#website\",\"url\":\"https:\/\/www.hostdime.com\/blog\/\",\"name\":\"HostDime Data Center Blog\",\"description\":\"Hyper Edge, Purpose-Built Data Centers\",\"publisher\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostdime.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#organization\",\"name\":\"HostDime\",\"url\":\"https:\/\/www.hostdime.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png\",\"contentUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png\",\"width\":150,\"height\":150,\"caption\":\"HostDime\"},\"image\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/hostdime\",\"https:\/\/x.com\/hostdime\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503\",\"name\":\"Jared Smith\",\"description\":\"Jared Smith is HostDime's Director of Marketing and the author of the HostDime Blog. Email Jared for guest blogging opportunities on your website or this one.\",\"sameAs\":[\"http:\/\/hostdime.com\/blog\"],\"url\":\"https:\/\/www.hostdime.com\/blog\/author\/jared-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Current State of DDoS Attacks and How To Mitigate Them","description":"DDoS attack mitigation is a necessity for enterprises looking to protect themselves. 91% of those surveyed said DDoS attacks can cost them up to $50,000.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/","og_locale":"en_US","og_type":"article","og_title":"The Current State of DDoS Attacks and How To Mitigate Them","og_description":"DDoS attack mitigation is a necessity for enterprises looking to protect themselves. 91% of those surveyed said DDoS attacks can cost them up to $50,000.","og_url":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/","og_site_name":"HostDime Blog","article_publisher":"https:\/\/www.facebook.com\/hostdime","article_published_time":"2020-06-11T18:40:30+00:00","article_modified_time":"2020-06-11T18:40:03+00:00","og_image":[{"width":500,"height":364,"url":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png","type":"image\/png"}],"author":"Jared Smith","twitter_misc":{"Written by":"Jared Smith","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#article","isPartOf":{"@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/"},"author":{"name":"Jared Smith","@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503"},"headline":"The Current State of DDoS Attacks and How To Mitigate Them","datePublished":"2020-06-11T18:40:30+00:00","dateModified":"2020-06-11T18:40:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/"},"wordCount":1707,"commentCount":5,"publisher":{"@id":"https:\/\/www.hostdime.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/","url":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/","name":"The Current State of DDoS Attacks and How To Mitigate Them","isPartOf":{"@id":"https:\/\/www.hostdime.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage"},"image":{"@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png","datePublished":"2020-06-11T18:40:30+00:00","dateModified":"2020-06-11T18:40:03+00:00","description":"DDoS attack mitigation is a necessity for enterprises looking to protect themselves. 91% of those surveyed said DDoS attacks can cost them up to $50,000.","breadcrumb":{"@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#primaryimage","url":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png","contentUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2018\/04\/DDoSattack_v2.png","width":500,"height":364,"caption":"ddos attack mitigation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostdime.com\/blog\/ddos-attack-mitigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostdime.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Current State of DDoS Attacks and How To Mitigate Them"}]},{"@type":"WebSite","@id":"https:\/\/www.hostdime.com\/blog\/#website","url":"https:\/\/www.hostdime.com\/blog\/","name":"HostDime Data Center Blog","description":"Hyper Edge, Purpose-Built Data Centers","publisher":{"@id":"https:\/\/www.hostdime.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostdime.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostdime.com\/blog\/#organization","name":"HostDime","url":"https:\/\/www.hostdime.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png","contentUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png","width":150,"height":150,"caption":"HostDime"},"image":{"@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hostdime","https:\/\/x.com\/hostdime"]},{"@type":"Person","@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503","name":"Jared Smith","description":"Jared Smith is HostDime's Director of Marketing and the author of the HostDime Blog. Email Jared for guest blogging opportunities on your website or this one.","sameAs":["http:\/\/hostdime.com\/blog"],"url":"https:\/\/www.hostdime.com\/blog\/author\/jared-s\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts\/12860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/comments?post=12860"}],"version-history":[{"count":34,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts\/12860\/revisions"}],"predecessor-version":[{"id":14597,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts\/12860\/revisions\/14597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/media\/11985"}],"wp:attachment":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/media?parent=12860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/categories?post=12860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/tags?post=12860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}