The DDOS attack in 2016

The DDOS attack in 2016

Student’s Name

University Affiliation


The distributed denial of services (DDOS) attacks is a subclass of denial of service (DOS). In a DDOS attack, the victims utilize both all system and the targeted end user system which is being applied and controlled by the hacker in this kind of attack. The number of this kind of attack is on the increase according to research as technology advances.

The DDOS attack in the year 2016

Among the DDOS attack that took place in 2016 is the Dyn cyber-attack that occurred on the 21st of October the same year. During this time, there were several attacks that targeted the DNS (Domain Name System) which the provider of the Dyn. The DDOS attacks led to various issues in the internet system especially to the users of the DNS. For example, the attack caused several attacks such as internet platforms and some of the services that were unavailable to the end users of North America and most parts of Europe (York, 2016).

The victim of the attack

The new world hackers and group anonymous declared that they were responsible for the Dyn cyber-attack probe. The hackers group claimed responsibility and said that the day’s antics were just some kind of dry run and that it has its sights set on a much bigger and greater target which they wish to accomplish. They want to bring the internet servers to their knees.

The technique used

The Dyn provides a managed DNS for the world’s biggest and most admired properties such as branding. More than 3500 enterprises such as digital brands like Netflix, LinkedIn, tweeter and others are powered by Dyn’s DNS solutions (York, 2016). The Dyn provider provides the services of mapping an internet domain identity or name to the end users of the services. However, when the Dyn provider entered through the browser in the web, they realized a kind of DDOS attack on the system which has been completed through a large number of the DNS requests for the application.

The attack was performed through the botnet which comprises of large numbers of internet connected devices which have been affected by the Mirai malware. The DDOS attack involves several devices that are connected online known as the botnet. This kind of techniques is then used to overcome a target website using a fake traffic within the systems. The kind of DDOS assaults does not attempt to breach a security system but they always make the website and servers unavailable to the end users. It is found that the more the number of users of the server the prone is the network to the attacks from the hackers (York, 2016).

Vulnerability of the system

The vulnerability issue or case in the system is the Mirai botnet which is given an estimation to have a throughput of 1.2 terabits per second. According to the researcher, it is the largest DDOS attack compared to the other attacks on the same system. The attack has been connected to the internet of things (IoT). The attackers were able to enlist the IoT devices that applied various usernames passwords. Moreover, the attackers took advantage of the manufactures and the users of the technology’s clueless and lack of knowledge on the fundamental security issues that pertain to the operation (Braga, Mota & Passito, 2010, October). Therefore, the absence of skills was a link and strength to the cause of the DDOS attack.

Remedial measures

The manufactures and the users should be educated about the security issues.


Braga, R., Mota, E., & Passito, A. (2010, October). Lightweight DDoS flooding attack detection using NOX/OpenFlow. In Local Computer Networks (LCN), 2010 IEEE 35th Conference on (pp. 408-415). IEEE.

York, K. (2016). Dyn statement on 10/21/2016 DDoS attack. Dyn Blog, October.

All Rights Reserved,