Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Political DDoS Around the World

By Dr. Jose Nazario
July 1, 2008

Distributed denial of service (DDoS) attacks are designed to overwhelm a target network with resource requests, leaving the victim unable to handle legitimate requests. These can come in many forms, but typically we see traffic floods that consume bandwidth and not application resources.

DDoS attacks are not new, and have grown in intensity and popularity in the past ten years with the rise of botnets. Botnets provide the needed “firepower” behind a DDoS attack - bandwidth and computers - as well as the infrastructure to manage such an attack. Most bot code bases provide some form of DDoS capabilities, and in measurements in 2006, it was found that approximately half of all of the botnets monitored launched at least one DDoS attack. Most of these attacks were against small, local targets with no widespread impact. Traditional botnets are not the only source of these attacks, as we increasingly see specialized kits being deployed to launch and control DDoS attacks.



MEASURING DDoS ATTACKS

DDoS attacks are measured in two primary ways. The first is through the ATLAS system, which ties together global DDoS statistics measured from backbone traffic. The second is through active botnet monitoring, watching commands passed to the bots and distilling the attack information from that. Both are needed to get a broader picture of DDoS activity, although neither one is complete. It is also known, from measurements, that they are a disjointed set of attacks, indicating that we are unable to track back the commands of all DDoS attacks we observe on the Internet.       


Assessing the intent behind a DDoS attack is usually speculative, and is often based on the victim’s external profile. DDoS motivations are often related to retaliation or anger against a victim’s actions, and sometimes include extortion or punitive attacks. In the past few years, tens of thousands of these sorts of attacks have been tracked across the globe, and no network is immune from the “business end” of such an event. Spammers or online phishing teams may carry out attacks against researchers as an effort to stop their work, but most frequently, these attacks are small attacks against broadband subscribers or small e-commerce sites. Larger, more sophisticated attacks involve extortion of some kind against a major online business. Some attacks have caused businesses to become bankrupt through the lost ability to handle customers or bandwidth charges.



HUGE IMPACTS

Personal research over the years has shown a steady increase in the severity of DDoS attacks. Based on surveys with tier-1 ISP operators, the largest observed DDoS attacks top over 40 Gbps. For reference, 40 Gbps is larger than the cores of all but the largest ISPs in the world, so any such attack would have massive impacts on the Internet backbone.

A subset of DDoS attacks appear to be politically motivated, where the victim is thought to have done some wrong against someone on the side of the attacker. In one of the most high profile events recently, the country of Estonia was hit with several weeks’ worth of DDoS attacks against their government and national infrastructure. These attacks coincided with street protests over Russia’s history in Estonia. Many people assumed that Russian authorities orchestrated the attacks, although we never found any evidence to support that claim. Botnets, as well as manual coordination, were behind most of the DDoS attacks, with Russian-language forums used in part of the organization behind such attacks. These attacks started again in the winter of 2007 against an Estonian newspaper, DELFI, during their coverage of the trials of several ethnic Russians charged with street-level crimes during the protests earlier in the year.

Other politically motivated DDoS attacks include those against the Russian politician Gary Kasparov and his political party during the run up to the winter 2008 elections. In this case, the Web site was disabled for a short period of time, enough to damage its use to their audience. This did not appear to cause any significant damage to the political party itself, however, meaning that these attacks were more like riots and protests than looting and pillaging.

As international tensions rise and botnets remain increasingly popular, this specific attack motivation is expected to continue. These are not state-sponsored activities behind some of these DDoS attacks, but instead a general population who are intent on taking their frustrations out on the Internet. It will be interesting to see how geopolitical events unfold online in the coming months and years.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dr. Jose Nazario is Senior Security Researcher at Arbor Networks, within the office of the CTO. In this capacity, he is responsible for analyzing burgeoning Internet security threats, reverse engineering malicious code, software development, developing security mechanisms that are then distributed to Arbor’s Peakflow platforms via the Active Threat Feed (ATF) threat detection service.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • DHS Works with Partners Across the Country and Around the World to Assess the Nation's Cyber Incident Response Capabilities

    See More
  • social-snaptrends

    The Social Media Security Problem for Corporations around the World

    See More
  • Workplace safety and security reimagining the workplace with not for profit office of the future prototype

    Not-for-profit Office of the Future prototype aims to help enterprises around the world reopen safely

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing