Understanding Cyber Warfare: DDoS attacks

Understanding Cyber Warfare: DDoS attacks

Irene here👩‍💻 – happy hump day everyone!

I aim to publish a newsletter issue every month, but I'm a couple of days late for Feb's issue. Oops! 🥺

I originally planned this newsletter to be a continuation of learning about the ELK stack, but in light of recent global events, I'm tabling logging and LogStash for the next issue to talk about cyber warfare instead.

I know it seems like we can't get a break with the news cycle and it's overwhelming. So to give you a break from doom-scrolling, I also wrote a lighter blog article on flirting your way to more influence with your engineering team 😉

As with every issue, I include a little box to explain technical terms and concepts at the bottom, so make sure to use it to your advantage!

Also included in this newsletter:
– NEW: Intro & Demo Videos for all technical module exercises

Connect with me on LinkedIn and Twitter and follow Skiplevel on LinkedIn!

Know someone that would like this newsletter? Share it with your friends by forwarding them this email!


Flirting your way to a better product-engineering relationship

.. No, not that type of flirting that’ll get you a visit from HR! Skiplevel is a rated PG company mind you 😉

I mean the type of flirting where you show appreciation for the other person and say to your engineers:

“What do you need from me to make your job easier?”

No, really. Those words verbatim. When was the last time you said those words to an engineer you worked with? Because let me tell you, those words are the best sweet-everythings an engineer wants to hear from their product manager, UX designer, operations, etc. that’ll instantly make them swoon.

And here’s why..


NEW: Intro & Demo Videos for all Technical Exercises!


Understanding Cyber Warfare: DDoS attacks

Today's modern warfare isn't complete without cyber warfare. We see this happening now in the Ukraine-Russia crisis. As the invasion is being waged on land, on air, and in the sea, the war is also waging over the internet.

While there are many ways to wage cyber warfare like exploiting vulnerabilities in software, and phishing, I'm going to focus on one of the more commonly used tactic during heightened cyber attacks: DDoS attacks. Heavy DDoS attacks are being levied on critical government and infrastructure systems around the world as you're reading this, so let's dig in shall we?

What's a DDoS attack?

DDoS stands for "Distributed Denial of Service". While some cyber attacks are meant to steal information, DDoS attacks are meant to disrupt business-as-usual by taking down servers hosting websites and applications. DDoS attacks do this by slowing down or shutting down server(s) by overwhelming them with a flood of traffic. This can bring down crucial infrastructure software like government services, dams, and healthcare systems wreaking havoc and chaos on normal life.

In the Skiplevel course, we learn about the fundamentals of servers and how every server has a limited amount of physical resources like memory, processors, hard drives etc. When there are more requests than there are server resources available, the server will slow down significantly or stop processing incoming requests altogether. You can compare this concept to how our brains have limited attention and when overwhelmed with information, we tend to shut down.

How are DDoS attacks achieved?

DDoS attacks are "distributed" because the flood of traffic isn't coming from just one computer, but many computers. These computers are infected with malware that allows them to be controlled remotely by an attacker. These infected computers are otherwise what we refer to as bots[1], and an interconnected network of many bots is called a botnet[2].

Botnets are made up of any type of computer or device including IoT devices. IoT[3] stands for "Internet of Things" and is the umbrella term for all smart devices that are connected to the internet such as smart refrigerators, cars, lights, thermostats, health monitors, and even microwaves!

In a DDoS attack, each bot is directed to send requests to the target server's IP address[4], thus overwhelming the server(s). Because each bot is a legitimate internet device, it's difficult to separate out bots from normal traffic, thus making DDoS attacks extremely difficult to stop, especially when there are hundreds of bots in the botnet.

Image courtesy of mikrotik.com

So are we doomed forever?

Yes and no. While DDoS attacks are serious, the tech industry broadly have developed methods to mitigate these sorts of malicious attacks. For example, popular web infrastructure and security companies like CloudFlare counteract DDoS attacks by creating a network of distributed servers to the point where traffic is absorbed by the network. Sort of like channeling a rushing river down separate smaller channels, making the impact more manageable.

But despite these mitigations, cyber security is becoming an increasingly pressing issue. In 2021 alone, there was a 50% increase in overall attacks per week on corporate networks compared to 2020.

So while "black hats[4]" will continue to innovate new weapons in cyber warfare just as "white hats[5]" will continue to find ways to thwart them. As such, it's crucial that governments and organizations invest in cyber security and prevention as prevailing trends will likely not let up any time soon.

Apply what you just learned to the current Ukraine-Russia Cyber warfare and read more about it here.

💡
Apply what you learned about Cyber Warfare & DDoS attacks and read more about the Ukraine-Russia cyber warfare here.

Definitions of tech terms*:

[1]Bot: A computer or device infected with malware allowing it to be controlled remotely.

[2]Botnet: An interconnected group of bots.

[3]IoT: "Internet-of-things". Umbrella term for smart devices connected to the internet such as smart refrigerators, cars, lights, thermostats, and health monitors, etc.

[4]IP Address: "Internet Protocol Address". Unique identifier of a device on the internet. Represented as a string of numbers separated by periods. Example: 191.293.1.38

[4]Black hats: Tech industry lingo for a person who hacks into a computer network with malicious or criminal intent

[5]White hats: Tech industry lingo for an "ethical hacker": person using hacking skills to identify security vulnerabilities in hardware, software, or networks.


As always, feel free connect with me on LinkedIn and Twitter and follow Skiplevel on LinkedIn.