
In the past, flood attacks were prevailing on the carrier network and infrastructure. Traffic DDoS attacks evolve to application attacks A DDoS attack is launched by only three steps, namely, downloading the attack tool, purchasing zombie hosts, and initiating the attack. Large numbers of botnets break off the technical threshold for DDoS attacks.

Moreover, attack tools become easily available. The number of DDoS attacks is 20 times of that in 2007, and over 30,000,000 zombie hosts flood the network.

Severe DDoS attacksĪt present, a single DDoS attack consumes more than 100 Gbit/s bandwidth. Instead, it forms an integral dark industry chain with overwhelming damages.

With the IT and network evolution, the Distributed Denial of Service (DDoS) attack has already broken away from original hacker behaviors.
