\n\t\t\t\t
A DDoS (Distributed Denial-of-Service) attack aims to disrupt your normal business operations through overloading a network, system, application, application component in such a manner that legitimate users will not be able to use your service.<\/p>
\u00a0<\/p>
Compared to other malicious activities, for this type of attack the attacker doesn’t need to compromise credentials, elevate access or to gain any access to your network or systems. The traffic the attacker is sending shares common characteristics with the normal traffic<\/p>
\u00a0<\/p>
A DDoS attack is launched from multiple compromised devices (hence Distributed<\/strong>) and also from different network, geographies over the world.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t