or network by overwhelming it with a flood of internet traffic from multiple sources , with the primary goal being to render the target ’ s services unavailable to legitimate users .
Unlike traditional Denial of Service ( DoS ) attacks , which originate from a single source , DDoS attacks harness the power of numerous compromised devices , often referred to as a botnet , to generate a massive volume of traffic .
Yet the jump from DoS to DDoS has not seen the end of the evolution of the form of attack .
“ The nature of DDoS attacks has seen further focus away from primarily volumetric and protocol -based attacks towards other methods , each of which presents unique challenges ,” explains Michael Skelton , VP of Operations , Bugcrowd .
Attackers are increasingly being observed taking application-based approaches to denial of service , often exploiting business process or logic flaws to deny service to users .
Equally , the automation of DDoS attacks can be generated and launched
142 March 2025