Cybersecurity Reference > Glossary
What is Distributed Denial of Service (DDoS)?
Unlike a simple DoS attack carried out from one machine, a DDoS attack coordinates thousands or even millions of compromised devices—often organized into botnets—to bombard the target simultaneously.
The victim's servers get overwhelmed trying to respond to this surge of requests, legitimate users can't get through, and the service effectively grinds to a halt.
These attacks can target different layers of the network stack, from saturating bandwidth with raw data floods to exhausting server resources with seemingly legitimate requests that are expensive to process. What makes DDoS particularly challenging is the distributed nature: blocking traffic from one source does little good when thousands more keep hammering away.
Origin
The evolution of DDoS tactics has tracked the growth of the internet itself. As bandwidth increased, attackers shifted from simple volumetric floods to more sophisticated application-layer attacks that exploit how web servers process requests. The rise of IoT devices created massive pools of insecure, network-connected gadgets that could be conscripted into botnets. The 2016 Mirai botnet, which enslaved hundreds of thousands of IoT devices to launch record-breaking attacks, marked a turning point in showing just how powerful and accessible DDoS capabilities had become. What started as a niche hacking technique is now a commodity service available for hire on the dark web.
Why It Matters
The threat landscape keeps expanding. Attack volumes have grown exponentially, with some recent attacks exceeding several terabytes per second. Attackers increasingly use DDoS as a smokescreen, launching floods to distract security teams while they attempt data theft or other intrusions. Ransom-driven DDoS attacks, where attackers threaten to take down services unless paid, have become common enough that many organizations face this extortion regularly.
What makes modern DDoS particularly challenging is the asymmetry: launching an attack costs very little compared to defending against one. An attacker can rent botnet time cheaply while victims must invest in substantial mitigation infrastructure just to stay online. This economic imbalance ensures DDoS will remain a persistent threat for any organization with an online presence.
The Plurilock Advantage
We design and implement multi-layered protection strategies that combine network-level filtering, traffic analysis, and rapid response protocols.
When attacks do occur, our incident response services mobilize quickly—often within days rather than weeks—to contain the threat and restore normal operations. We bring experience from former intelligence professionals and defense leaders who understand both attack methodologies and practical, cost-effective mitigation strategies that actually work.
.




