News / How are you defending your organisation against the weaponisation of DDoS?

Recently, development platform, gitHub’s code hosting website, experienced potentially the largest-ever distributed denial of service (DDoS) attack, with the attackers using weaponization tactics to amplify the strength of the strike.

DDoS attacks, which are considered among the most persistent and destructive forms of cyber-attacks, have been around for nearly 45 years. So, they are not a new phenomenon. Even today, the fundamental principle behind a DDOS attack remains the same – i.e. a hacker  makes a machine/network unavailable to users by temporarily disrupting services connected to the Internet. However, the mechanism by which these attacks are delivered has become a lot more sophisticated.

Nowadays, there are many variants and types of DDoS attacks that hackers deploy – from SYN Flood, UDP Flood and HTTP Flood; Smurf, Fraggle, application-level and zero-day attacks through to NTP amplification and Advanced Persistent DoS. This is by no means a comprehensive list.

What approach and measures is your organisation taking to protect itself against these assaults?

The Cyberists at Reliance acsn have a good understanding of the various types of DDoS attacks and experience in helping organisations to institute a multi-layered approach to protecting the business and minimising the disruption – in the unfortunate event that such an incident actually occurs. A Security Operations-based methodology can genuinely mitigate the effects of a DDoS attack and enable organisations to be up and running quickly.

Reliance acsn Cyberists can be contacted on phone +44 (0)845 519 2946 or by email, if this is an area you are looking for assistance on.


  • PLUS
  • Certified Information Systems Security Professional
  • PCi
  • Information Security Management System - ISO Certified
  • Cisco Certified CCIE
  • Centre for Internet Security
  • TOGAF 9
  • HM Government G-Cloud Supplier
  • crest

Get in touch