Over a million developers have joined DZone.

Routers: Both Targets and Perpetrators in DDoS Attacks

DZone's Guide to

Routers: Both Targets and Perpetrators in DDoS Attacks

Recent DDoS attacks highlight the importance of monitoring and load testing tools to detect and deflect DDoS attacks on your company's platforms.

· Performance Zone ·
Free Resource

Sensu is an open source monitoring event pipeline. Try it today.

The most recent major distributed denial-of-service attacks have stemmed from hackers hijacking countless Internet of Things devices and using them to create massive botnets to knock down servers; however, other devices like routers are still major contributors. Routers have the unfortunate distinction of often being targeted during a DDoS attack and as a device capable of being hijacked to commit the attack. Routers are important to look at when understanding how a DDoS attack is created because hackers take advantage of the same poor security practices implemented on IoT devices to seize routers.

Using a Router for DDoS

Being aware of potential issues highlights the importance of using monitoring and load testing tools for detecting and mitigating DDoS attacks on your company’s various web platforms. Unfortunately, routers as a device class are notorious for having a large number of security holes. Hackers aren’t limited to a single mode of entry to compromise a router, but instead, they can use:

Building A Network to Avoid DDoS Attacks

A DDoS botnet is more about quantity than quality; the more devices that can produce more traffic the better. It’s often much easier to infiltrate countless small targets and use the combined power to overwhelm a larger target than it is to break into a secure, larger target. Therefore, hackers will look at any device that’s capable of producing Internet traffic as a potential candidate for a DDoS bot. While there are thousands of router models in use, shared security vulnerabilities still make them viable targets.

Sensu: workflow automation for monitoring. Learn more—download the whitepaper.

performance ,ddos ,monitoring ,load testing ,routers

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}