Understanding and Responding To Ddos Attacks - 508c
Understanding and Responding To Ddos Attacks - 508c
to Distributed Denial-of-Service
Attacks
Reporting
CISA and FBI urge you to promptly report DDoS incidents to a local FBI Field Office, or to CISA
at [email protected] or (888) 282-0870. State, local, tribal, and territorial government entities
can also report to the MS-ISAC ([email protected] or 866-787-4722).
Disclaimer
The information in this report is being provided “as is” for informational purposes only. CISA,
FBI, and the MS-ISAC do not endorse any commercial product or service, including any
subjects of analysis. Any reference to specific commercial entities or commercial products,
processes, or services by service mark, trademark, manufacturer, or otherwise, does not
constitute or imply endorsement, recommendation, or favoritism by CISA, FBI, or the MS-ISAC.
Resources
• See CISA’s Cybersecurity Toolkit to Protect Elections for DDoS-specific information.
• See MS-ISAC’s Guide to DDoS Attacks for additional DDoS remediation efforts.
• See NIST Special Publication (NIST SP) - 800-189: Resilient Interdomain Traffic
Exchange: BGP Security and DDoS Mitigation for additional DDoS mitigations
• See CISA’s DDoS Quick Guide for possible attack methods per OSI layer, potential
impact, possible DDoS traffic type descriptions, and the applicable recommended
mitigation strategies and relevant hardware.
• See CISA’s Tip: Understanding Denial-of-Service Attacks for additional information.
• See FBI Private Industry Notification on Potential Cyber Activities During the 2022
Beijing Winter Olympics and Paralympics about cyber actors using DDoS to disrupt
events.
• For additional information regarding hacktivism or DDoS attacks, see the following
Public Service Announcements on IC3.gov.
o Distributed Denial of Service Attacks Could Hinder Access to Voting Information,
Would Not Prevent Voting
o Booter and Stresser Services Increase the Scale and Frequency of Distributed
Denial of Service Attacks
• See MITRE ATT&CK for Detection and Mitigation techniques for:
o Network Denial of Service [T1498]
o Direct Network Flood [T1498.001]
o Reflection Amplification [T1498.002]
• CISA Tabletop Exercise Packages