Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Political DDoS Around the World

By Dr. Jose Nazario
July 1, 2008

Distributed denial of service (DDoS) attacks are designed to overwhelm a target network with resource requests, leaving the victim unable to handle legitimate requests. These can come in many forms, but typically we see traffic floods that consume bandwidth and not application resources.

DDoS attacks are not new, and have grown in intensity and popularity in the past ten years with the rise of botnets. Botnets provide the needed “firepower” behind a DDoS attack - bandwidth and computers - as well as the infrastructure to manage such an attack. Most bot code bases provide some form of DDoS capabilities, and in measurements in 2006, it was found that approximately half of all of the botnets monitored launched at least one DDoS attack. Most of these attacks were against small, local targets with no widespread impact. Traditional botnets are not the only source of these attacks, as we increasingly see specialized kits being deployed to launch and control DDoS attacks.



MEASURING DDoS ATTACKS

DDoS attacks are measured in two primary ways. The first is through the ATLAS system, which ties together global DDoS statistics measured from backbone traffic. The second is through active botnet monitoring, watching commands passed to the bots and distilling the attack information from that. Both are needed to get a broader picture of DDoS activity, although neither one is complete. It is also known, from measurements, that they are a disjointed set of attacks, indicating that we are unable to track back the commands of all DDoS attacks we observe on the Internet.       


Assessing the intent behind a DDoS attack is usually speculative, and is often based on the victim’s external profile. DDoS motivations are often related to retaliation or anger against a victim’s actions, and sometimes include extortion or punitive attacks. In the past few years, tens of thousands of these sorts of attacks have been tracked across the globe, and no network is immune from the “business end” of such an event. Spammers or online phishing teams may carry out attacks against researchers as an effort to stop their work, but most frequently, these attacks are small attacks against broadband subscribers or small e-commerce sites. Larger, more sophisticated attacks involve extortion of some kind against a major online business. Some attacks have caused businesses to become bankrupt through the lost ability to handle customers or bandwidth charges.



HUGE IMPACTS

Personal research over the years has shown a steady increase in the severity of DDoS attacks. Based on surveys with tier-1 ISP operators, the largest observed DDoS attacks top over 40 Gbps. For reference, 40 Gbps is larger than the cores of all but the largest ISPs in the world, so any such attack would have massive impacts on the Internet backbone.

A subset of DDoS attacks appear to be politically motivated, where the victim is thought to have done some wrong against someone on the side of the attacker. In one of the most high profile events recently, the country of Estonia was hit with several weeks’ worth of DDoS attacks against their government and national infrastructure. These attacks coincided with street protests over Russia’s history in Estonia. Many people assumed that Russian authorities orchestrated the attacks, although we never found any evidence to support that claim. Botnets, as well as manual coordination, were behind most of the DDoS attacks, with Russian-language forums used in part of the organization behind such attacks. These attacks started again in the winter of 2007 against an Estonian newspaper, DELFI, during their coverage of the trials of several ethnic Russians charged with street-level crimes during the protests earlier in the year.

Other politically motivated DDoS attacks include those against the Russian politician Gary Kasparov and his political party during the run up to the winter 2008 elections. In this case, the Web site was disabled for a short period of time, enough to damage its use to their audience. This did not appear to cause any significant damage to the political party itself, however, meaning that these attacks were more like riots and protests than looting and pillaging.

As international tensions rise and botnets remain increasingly popular, this specific attack motivation is expected to continue. These are not state-sponsored activities behind some of these DDoS attacks, but instead a general population who are intent on taking their frustrations out on the Internet. It will be interesting to see how geopolitical events unfold online in the coming months and years.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dr. Jose Nazario is Senior Security Researcher at Arbor Networks, within the office of the CTO. In this capacity, he is responsible for analyzing burgeoning Internet security threats, reverse engineering malicious code, software development, developing security mechanisms that are then distributed to Arbor’s Peakflow platforms via the Active Threat Feed (ATF) threat detection service.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing