DDOS attacks and how companies are preventing them

Understanding DDoS Attacks and How the Internet Survives Them

The modern internet is an incredible engineering achievement. Every day billions of users access websites, APIs, and applications without realizing the massive infrastructure working behind the scenes to keep everything online.

One of the biggest threats to online systems is the Distributed Denial of Service (DDoS) attack.

Let's explore:

  • What a DDoS attack is

  • How attackers launch them

  • How companies like Cloudflare, Google, and Amazon Web Services defend against them

  • The architecture that keeps modern applications resilient


What is a DDoS Attack?

A DDoS (Distributed Denial of Service) attack happens when thousands or even millions of computers flood a server with traffic, overwhelming it so legitimate users cannot access the service.

Think of it like this:

A restaurant has 20 seats.

Now imagine 10,000 fake customers rush in at the same time.

Real customers can no longer enter.

That is exactly what happens to a server during a DDoS attack.


How does a typical DDoS Attack look like?

In a typical attack:

  1. Hackers infect thousands of devices

  2. These devices form a botnet

  3. All devices send requests simultaneously

  4. The server becomes overwhelmed


Where Do the Attacking Computers Come From?

Attack traffic often comes from compromised devices such as:

  • Home routers

  • Security cameras

  • IoT devices

  • Personal computers

One of the most famous botnets was Mirai, which infected thousands of IoT devices worldwide.

These devices were unknowingly used to launch massive attacks across the internet.


How Security Platforms Detect Bots

Security providers like Cloudflare use multiple signals to distinguish between real users and bots.

Some detection methods include:

Traffic Behavior Analysis

Real users browse naturally.

Bots behave differently:





Browser Fingerprinting

Security systems analyze browser characteristics:

  • screen resolution

  • installed fonts

  • WebGL rendering

  • browser APIs

Bots often fail to perfectly mimic these signals.


JavaScript Challenges

Sometimes you see:

"Checking your browser before accessing the website."

This happens when a security platform runs a JavaScript challenge to verify the browser.

Simple bots cannot execute JavaScript correctly.


Modern Web Architecture with DDoS Protection

Modern web applications are designed with multiple layers of protection.

Typical flow:

User
  |
HTTPS
  |
Cloudflare WAF / CDN
  |
Frontend (React)
  |
Backend API (FastAPI)
  |
Redis Cache
  |
PostgreSQL Database

Each layer provides additional resilience and protection.


How the Internet Handles Massive Attacks

Some DDoS attacks are unbelievably large.

For example:

  • 46 million requests per second attack mitigated by Google

  • 71 million requests per second blocked by Cloudflare

  • 2.3 Tbps attack mitigated by AWS

To defend against attacks of this scale, companies rely on global infrastructure.


Global Anycast Networks

Instead of sending traffic to one server location, requests are routed to the nearest data center.

Benefits:

  • traffic load is distributed globally

  • attacks are absorbed across many locations

  • no single data center becomes overwhelmed


Multi-Layer Defense Strategy

Modern systems defend against attacks using multiple layers:

  1. IP reputation filtering

  2. Rate limiting

  3. Browser fingerprinting

  4. Machine learning detection

  5. CAPTCHA or human verification

  6. Edge network filtering

Each request receives a risk score.

Low risk → Allow
Medium risk → Challenge
High risk → Block

The Hidden Infrastructure of the Internet

Most users never see this infrastructure.

But every time you open a website, your request passes through:

  • global edge networks

  • web application firewalls

  • traffic filtering systems

  • distributed caching layers

These systems protect applications from attackers while ensuring fast and reliable access for real users.


Final Thoughts

DDoS protection is one of the most fascinating areas of modern distributed systems.

It combines:

  • networking

  • cybersecurity

  • machine learning

  • large-scale infrastructure engineering

The next time you load a website, remember that behind the scenes, powerful systems are working constantly to ensure the internet stays available.


Author
Manoj Tharayil
Test Automation Leader | Software Quality Advocate | Technology Enthusiast

Comments

Popular posts from this blog

The pesky scrollbars on Remote desktop - Finally fixed!!

API Testing with Rest Assured - Validating the json schema