Understanding and Responding to Distributed Denial-Of-Service Attacks

Publish Date

This joint guide, Understanding and Responding to Distributed Denial-Of-Service Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques: 

  • Volumetric, attacks aiming to consume available bandwidth. 
  • Protocol, attacks which exploit vulnerabilities in network protocols. 
  • Application, attacks targeting vulnerabilities in specific applications or running services. 

CISA, FBI, and MS-ISAC urge network defenders and leaders of critical infrastructure organizations to read the guidance provided to defend against this threat. For more actionable recommendations, best practices, and operational insights designed to address common challenges, visit CISA’s Capacity Enhancement Guides for Federal Agencies page.