A Distributed Denial of Service (DDoS) attack overwhelms a target's servers or network by sending huge volumes of requests from many different devices simultaneously. This traffic surge consumes bandwidth and processing capacity, forcing the service offline or making it unusably slow.
DDoS attacks differ from regular traffic spikes because they're malicious and coordinated. Attackers typically use botnets, which are networks of compromised computers (often unknowingly infected with malware) that all send requests at once. Some attacks target the network layer with massive data floods, whilst others exploit specific application weaknesses.
Why it matters for buyers: If you rely on cloud services, websites, or gaming platforms, DDoS attacks can disrupt your access. Many hosting providers and content delivery networks (CDNs) now offer DDoS protection as standard or premium features. For small business owners, understanding DDoS risk helps you choose providers with adequate safeguards.
Common gotchas: Not all service outages are DDoS attacks, though people often assume they are. Legitimate traffic spikes during product launches or major events can look similar. Some attackers use DDoS as cover whilst attempting deeper breaches. Free DDoS protection often has limits on data volume or response time.
What you can do: Use services with built-in DDoS mitigation if you run a website. Keep devices updated to avoid becoming part of a botnet. If you experience unexplained downtime, contact your hosting provider to check for attacks rather than assuming technical failure.
