{"id":1218,"date":"2021-03-16T15:34:03","date_gmt":"2021-03-16T15:34:03","guid":{"rendered":"https:\/\/www.nameshield.com\/en\/?page_id=1218"},"modified":"2024-08-13T16:50:10","modified_gmt":"2024-08-13T14:50:10","slug":"5-minutes-to-understand-ddos-attack","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/","title":{"rendered":"5 minutes to understand: DDoS attack"},"content":{"rendered":"<div class=\"wp-block-image eplus-rIQtuP eplus-wrapper\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"834\" src=\"https:\/\/nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\" alt=\"5 minutes to understand: DDoS attack\" class=\"wp-image-1638\" style=\"width:200px;height:209px\" srcset=\"https:\/\/www.nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png 800w, https:\/\/www.nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset-288x300.png 288w, https:\/\/www.nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset-768x801.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/figure>\n<\/div>\n\n\n<p class=\"eplus-SsRWxs eplus-wrapper\">The <strong><em>DDoS attack<\/em><\/strong> or Denial of Ser\u00advice (DDoS) attack is an IT attack aimed at mak\u00ading a ser\u00advice unavail\u00adable by flood\u00ading a serv\u00ader with mali\u00adcious requests. The attack brings down the serv\u00ader or pre\u00advents it from respond\u00ading to legit\u00adi\u00admate requests from users of the ser\u00advice.<\/p>\n\n\n\n<p class=\"eplus-V5sUyC eplus-wrapper\">Dis\u00adcov\u00ader in this \u201c5 min\u00adutes to under\u00adstand\u201d doc\u00adu\u00adment, what is an <strong><em>DDoS attacks<\/em><\/strong> and the solu\u00adtions to put in place to counter them. <\/p>\n\n\n\n<p class=\"eplus-V5sUyC eplus-wrapper\">By val\u00adi\u00addat\u00ading this form you will have access to the down\u00adload of the \u201c5 min\u00adutes to under\u00adstand\u201d doc\u00adu\u00adment: <strong><em>DDoS attack<\/em><\/strong>.<\/p>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"eu1\",\n    portalId: \"139723310\",\n    formId: \"130050d7-d98d-45cd-b72d-a92b5ff8d374\"\n  });\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>The DDoS attack or Denial of Ser\u00advice (DDoS) attack is an IT attack aimed at mak\u00ading a ser\u00advice unavail\u00adable by flood\u00ading a serv\u00ader with mali\u00adcious requests. The attack brings down the serv\u00ader or pre\u00advents it from respond\u00ading to legit\u00adi\u00admate requests from users of the ser\u00advice. Dis\u00adcov\u00ader in this \u201c5 min\u00adutes to under\u00adstand\u201d doc\u00adu\u00adment, what is\u2026&nbsp;<a href=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/\" class rel=\"bookmark\">Read More \u00bb<span class=\"screen-reader-text\">5 min\u00adutes to under\u00adstand: DDoS attack<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1079,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-1218","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 minutes to understand: DDoS attack - Nameshield<\/title>\n<meta name=\"description\" content=\"Find in this &quot;5 min to understand&quot; document, available for download on Nameshield website, what&#039;s a DDoS attack and how to protect against it\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 minutes to understand: DDoS attack - Nameshield\" \/>\n<meta property=\"og:description\" content=\"Find in this &quot;5 min to understand&quot; document, available for download on Nameshield website, what&#039;s a DDoS attack and how to protect against it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-13T14:50:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/\",\"name\":\"5 minutes to understand: DDoS attack - Nameshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nameshield.com\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/09\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\",\"datePublished\":\"2021-03-16T15:34:03+00:00\",\"dateModified\":\"2024-08-13T14:50:10+00:00\",\"description\":\"Find in this \\\"5 min to understand\\\" document, available for download on Nameshield website, what's a DDoS attack and how to protect against it\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nameshield.com\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/09\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\",\"contentUrl\":\"https:\\\/\\\/nameshield.com\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/09\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/5-minutes-to-understand-ddos-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"5 minutes to understand&#8230;\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 minutes to understand: DDoS attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 minutes to understand: DDoS attack - Nameshield","description":"Find in this \"5 min to understand\" document, available for download on Nameshield website, what's a DDoS attack and how to protect against it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"5 minutes to understand: DDoS attack - Nameshield","og_description":"Find in this \"5 min to understand\" document, available for download on Nameshield website, what's a DDoS attack and how to protect against it","og_url":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/","og_site_name":"Nameshield","article_modified_time":"2024-08-13T14:50:10+00:00","og_image":[{"url":"https:\/\/nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/","url":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/","name":"5 minutes to understand: DDoS attack - Nameshield","isPartOf":{"@id":"https:\/\/www.nameshield.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","datePublished":"2021-03-16T15:34:03+00:00","dateModified":"2024-08-13T14:50:10+00:00","description":"Find in this \"5 min to understand\" document, available for download on Nameshield website, what's a DDoS attack and how to protect against it","breadcrumb":{"@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/#primaryimage","url":"https:\/\/nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","contentUrl":"https:\/\/nameshield.com\/en\/wp-content\/uploads\/sites\/2\/2021\/09\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"5 minutes to understand&#8230;","item":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/"},{"@type":"ListItem","position":2,"name":"5 minutes to understand: DDoS attack"}]},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/en\/#website","url":"https:\/\/www.nameshield.com\/en\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/comments?post=1218"}],"version-history":[{"count":4,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1218\/revisions"}],"predecessor-version":[{"id":2439,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1218\/revisions\/2439"}],"up":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1079"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/media?parent=1218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}