UNDER DDoS ATTACK?
What is a DDoS Attack?
In DDoS (distributed denial-of-service) attacks, hackers gain control of hundreds or thousands of computers and unleash these machines on a company, flooding its servers with so many requests that they become overloaded and fail. Increasingly, these pirated devices are not computers, but could be any smart device: from phones to thermostats to light bulbs.
Keep your Website, Data, and Applications Safe with Akamai's Intelligent Security Platform
FAST FACTS ABOUT DDoS ATTACKS
Largest DDoS Attack
This attack set the record for the largest attack mitigated by Akamai.Download White Paper
UDP fragment floods are used in nearly a third of all DDoS attacks.More DDoS Activity
Cost per company per year
Customer-facing revenue losses exceed costs in each of four other areas.Download Report
DDoS Attacks 101
How DDoS Attacks Work
DDoS attacks work by harnessing the power of other devices to send unwanted traffic to the target.Learn More
Attackers and malicious actor groups have a variety of different reasons for launching DDoS attacks. Whether the goal is to compromise brand trust or gain a competitive advantage, the end result of a DDoS attack can be catastrophic for an organization.Learn More
Preventing and Stopping DDoS Attacks
See Akamai DDoS Mitigation in action
Can I Prevent DDoS Attacks?
With a DDoS protection plan and runbook, you can prevent damage from DDoS attacks.
A CDN-based DDoS protection service can prevent malicious traffic from reaching your website or API.
A DDoS scrubbing service can quickly mitigate attacks that target non-web infrastructure.Learn More
DDoS Prevention Resources
Zero-second DDoS Mitigation SLA
Learn about proactive mitigation controls and how they provide zero-second DDoS mitigation backed by Akamai’s industry-leading SLA.Download Now
The State of the Internet / Security Report
Check out emerging trends, attack statistics, and market changes related to the security landscape.Read the Report
Nine Myths About DDoS Protection
There are a lot of myths about DDoS protection floating around — some are even encouraged by security vendors. Discover what organizations need to know to avoid a vulnerable DDoS defense strategy.Download Now
DDoS Protection Products
The Smartest Protection Against DDoS Attacks
Cloud-Based Protection for DDoS Attacks
During a DDoS attack, network pipes can be overwhelmed, rendering useless on-premise DDoS mitigation hardware. That’s why businesses are moving to cloud-based security, which has greater scale and capacity for DDoS protection.Learn More About Akamai Cloud Security
Akamai Prolexic Solutions
Prolexic solutions provide fully managed DDoS protection for your applications, data centers, and network infrastructure. With Prolexic DDoS protection in place, your services will remain available and responsive during a broad range of attacks, including high-bandwidth and shifting-vector attacks.Learn More
Tour our Security Operations Center
Defense By Design: How To Dampen DDoS Attacks With A Resilient Network
DDoS attacks cripple targets while commandeering massive resources across the Internet. Learn how Eugene Spafford, executive director emeritus at Purdue University, developed effective defenses against DDoS attacks by architecting a resilient network.Read the Article
2018 DDoS and Web Application Attack Stats / Asia Pacific
Organizations share their DDoS experiences, including costs, hours of downtime, mitigation technologies, top consequences, and barriers to DDoS protection.Read the PDF
Understanding DDoS Reflection — Memcached UDP
Hear from Akamai’s Renny Shen on why and how organizations need to prepare for DDoS attacks using UDP reflection.Watch the Video
Additional DDoS Resources
Understanding the prevalence and costs associated with web applications and denial of service attacks is crucial for organizations. Based on surveys of more than 600 IT professionals, discover typical attack costs and other cloud security trends.Read the Report
On February 28, 2018, the largest DDoS attack recorded to date targeted an Akamai customer with a recording setting 1.3 Tbps of Memcached reflection DDoS traffic. Learn about Memcached DDoS, the importance of DDoS mitigation planning, and how Akamai is architected for DDoS resilience.Download the Report
The largest DDoS attacks have continued to increase greatly in strength and doubling in attack size and among the largest recent years was in 2016 using the Mirai Botnet. Learn about Mirai, the rise of IoT botnets, and the resilience of the Akamai Intelligent Edge Platform.Download the Report