Professional Documents
Culture Documents
DDoS ATTACKS
By Aria Ibnat
TABLE OF CONTENTS
In the realm of cybersecurity, Distributed Denial of Service (DDoS) attacks have emerged as
a formidable threat, capable of disrupting online services and causing widespread chaos. This
case study delves into two significant DDoS attacks that left a lasting impact on the digital
landscape: the Dyn attack of 2016 and the GitHub incident of 2018. These high-profile events
serve as stark reminders of the evolving tactics employed by malicious actors and the critical
importance of robust cybersecurity measures in today's interconnected world. By exploring
the intricacies and consequences of these attacks, we can gain valuable insights into the ever-
present need for vigilance and resilience in the face of the growing DDoS menace.
The Dyn DDoS Incident
Dyn is a major DNS (Domain Name System) service
provider responsible for translating human-readable
domain names into IP addresses, ensuring the proper
functioning of numerous websites and online services.
October 21
• Caused a widespread service disruption affecting popular websites,
services, and even IoT devices.
• Geographic Impact
• Increased Awareness
GitHub DDoS Incident
On February 28, 2018, the GitHub DDoS Attack emerged as a
significant cybersecurity incident that targeted the world's largest
platform for software development and collaboration. This attack
highlighted the evolving tactics employed by cybercriminals to
disrupt critical online infrastructure.
The Dyn (2016) and GitHub (2018) DDoS attacks represent pivotal moments in the
ongoing battle against cyber threats. These incidents showcased the vulnerabilities of our
increasingly interconnected world and emphasized the critical role of cybersecurity in
maintaining the stability of online services. As we reflect on these case studies, it is evident
that DDoS attacks continue to evolve in scale and complexity, necessitating constant
innovation in defense strategies. The lessons learned from these attacks underscore the
imperative of collaborative efforts between organizations, governments, and individuals to
fortify our digital infrastructure. In an era where our daily lives are inexorably linked to the
digital realm, these case studies serve as a stark reminder of the need for ongoing
vigilance, adaptability, and resilience in the face of an ever-evolving threat landscape.
THANK
YOU—THE END