Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

DDoS Attacks Grow with a New Twist!

By Kevin Coleman
July 10, 2017

Distributed denial of service (DDoS) attacks against business, government, industry as well as military and intelligence systems continue as strong as ever. In the first six months of 2016, DDoS attacks escalated in both size and frequency. Others project the duration of DDoS attacks will increase and increase the costs and outages. The threat and impact has grown to the point where a major computer publication ran an article titled, “DDoS attack threat cannot be ignored.” They are right, but what hasn’t been covered is a newly discovered DDoS technique with some interesting observations that are quite disturbing.

The costs of DDoS attacks on some companies can exceed $100,000 per hour due primarily to disruption. For example, the DDoS attack in 2010 on the Virgin Blue airline reportedly costs totaled $20 million due to the IT outages that spanned 11 days.

In May 2017, ZDNet reported that the average DDoS attack cost for businesses increased to more than $2.5 million. One of the longest DDoS attack in Q2 2016 lasted 291 hours, or 12 days of disruption.

Now that you understand the costs of being on the receiving edge of a cyberattack, what are the costs to launch a DDoS attack?  To do that I looked at three examples of the cost to have a DDoS attack delivered to a specified target. All three costs ranged from $7 to $25 per hour of attack. So the 291 have attack cost could have been as low as $2,000 to a high end of $7,275. Some cyber intelligence organizations believe that DDoS attacks will continue to increase and we will see a “BLIZZARD” of DDoS attack by 2020. While those number are concerning, a new twist to DDoS attacks has been unearthed that is even more troublesome.

Many cybersecurity professionals believe that industrial sabotage is considered the most likely reason behind a DDoS attack. In fact, Kaspersky Security recently noted that 43% of businesses that became victims of a DDoS attack believe it was launched (paid for by) by a competitor. It is generally believed that DDoS attacks on larger businesses are due to foreign governments and former employees.

A new and problematic cyberattack technique was recently created/discovered that has unique properties that make this attack technique concerning.  It's called an Internal Distributed Denial of Service (iDDoS) attack, and it is created when multiple compromised computers, smartphones, tablets, equipment and devices that are often infected through the use of Phishing schemes and Trojans generate an excessive amount of internal network traffic. The internal network traffic that is flooding the corporate network(s) originates from many different internal sources that have been infected.  These compromised computers, equipment and devices can either generate massive amounts of junk data or legitimate data or system requests.

iDDoS attacks are likely to become a substantial issue in the future. One of the interesting aspects of this attack technique is that it most likely requires less bandwidth consumption to be disruptive! A scan of cybersecurity products and their applications clearly indicate all protection and detection capabilities are focused externally (not for internal attacks like this). iDDoS is a state of the art cyber weapon of targeted disruption. Consider the use of iDDoS by criminals (ransom) that could easily target the numerous unprotected devices in Smart Homes, Smart Office Building, and Smart Cities.

Can any of your DDoS tools and techniques be applied when it is behind a firewall? Consider their exposure to an iDDoS attack and what they will do when one occurs within your enterprise. 

KEYWORDS: cyber attack cyber security DDoS

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing