Sadly DDOS attacks are becoming more common, and are been used for anything from fun for script kiddies, to criminal gangs using it to exploit money from your business.
First, we need to understand what DDOS is, originally it was just DOS, DOS stands for Denial Of Service Attack, this was a single machine sending more requests to the server then it could handle, eventually driving it Offline and inaccessible.
However, as computer power has grown, DOS attacks rarely work now, so DDOS become the norm. In this case, it’s a Disrupted Denial Of Service Attack, in short, many machine target a single point and try to flood it, this flood can be request based, hoping to take it down by forcing the attacked machine to run out of resources and therefore unable to answer any more requests.
What we are seeing more of now, however, is DDOS attacks using traffic flooding techniques. In the simplest terms, it uses a compromised group of computers to send either simple types of packets or specially crafted packets in order to use all your available bandwidth. In this case, they don’t need a single request to reach your machine, all they are trying to do is fill up the network pipe that goes to your machine, thus making it very difficult for other people to sustain any meaningful connection. The easiest way to think of this is trying to drink a pint of water in one go, only so much will go into your mouth before it spills over the edges and ends up on the floor. In the case of the internet to packets just time out.
We can offer protection against both types of attacks. Although sadly sometimes as we saw with the DYNDNS attack, there is only so much bandwidth available. http://dyn.com/blog/dyn-statement-on-10212016-ddos-attack/