{"id":61516,"date":"2021-04-09T04:08:14","date_gmt":"2021-04-09T10:08:14","guid":{"rendered":"https:\/\/www.scalahosting.com\/blog\/?p=61516"},"modified":"2026-01-22T13:24:46","modified_gmt":"2026-01-22T19:24:46","slug":"cyber-attack-guide-ddos-attacks","status":"publish","type":"post","link":"https:\/\/www.scalahosting.com\/blog\/cyber-attack-guide-ddos-attacks\/","title":{"rendered":"Cyber Attack Guide \u2013 DDoS Attacks"},"content":{"rendered":"\n<p>Quite a lot of people plunge head-first into their new project and try to build their first websites without considering all the factors involved. <strong>Security <\/strong>is overlooked alarmingly often, and as a result, far too many projects come to a quick and completely avoidable end.<\/p>\n\n\n\n<p>As an example,<strong> DDoS attacks<\/strong> are widespread and have been around for ages. Yet, many admins don&#8217;t have even the most basic understanding of what they are and how they work.<\/p>\n\n\n\n<p>Let&#8217;s see if we can fix this&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the\"><strong>The State of Cybersecurity<\/strong><\/h2>\n\n\n\n<p>In <strong>2017<\/strong>, researchers from the <strong>University of Maryland <\/strong>estimated that worldwide, on average, a cyber attack is launched <strong>every 39 seconds<\/strong>. More than likely, <strong>hacking attempts<\/strong> are even more frequent today.<\/p>\n\n\n\n<p>In <strong>2020,<\/strong> during the height of the COVID-19 crisis, Swiss authorities reported <strong>three times the usual number of cyber attacks<\/strong>. The fact of the matter is, with or without a global pandemic, cybercrime is a massive business that reaps hacked a lot of benefits.<\/p>\n\n\n\n<p><strong>Ransomware operators<\/strong> encrypt users&#8217; and organizations&#8217; files and extort money in exchange for their data. Malicious <strong>cryptomining scripts<\/strong> put enormous loads on unsuspecting victims and consume vast quantities of electric power to line miscreants&#8217; pockets. Hackers breach business organizations to steal personal and sensitive data, which is then brokered and abused in all manner of ways.<\/p>\n\n\n\n<p>You don&#8217;t even need to have any <strong>advanced technical skills<\/strong> to target an attack at someone. All you have to do is go to a hacking forum, pay someone for a DDoS service, and aim it at a site or server of your choice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\"><strong>What Are DDoS Attacks?<\/strong><\/h2>\n\n\n\n<p>It&#8217;s important to make a distinction between <strong>different types of cyber attacks.&nbsp;<\/strong><\/p>\n\n\n\n<p>For example, the goal of a DDoS attack isn&#8217;t to alter the way your site looks or steal user data. Beefing up your site&#8217;s admin password or updating your <a href=\"https:\/\/www.scalahosting.com\/blog\/what-is-a-content-management-system\/\"><strong>CMS<\/strong><\/a> will do little to protect you from it.<\/p>\n\n\n\n<p><strong>DDoS<\/strong> stands for <strong>Distributed Denial of Service<\/strong>, and, as the &#8220;<em>Denial of Service&#8221;<\/em> bit suggests, the goal of such an attack is to deny user access to a service or a resource. In other words, it&#8217;s supposed to <strong>knock your website offlin<\/strong>e or, at the very least, severely <strong>disrupt its performance.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how\"><strong>How Do DDoS Attacks Work?<\/strong><\/h2>\n\n\n\n<p>The ultimate goal of a DDoS attack is to <strong>overwhelm the website and the underlying infrastructure with fake traffic<\/strong>. In very basic terms, the attacker sends an enormous number of requests to a targeted site and puts a load on the hosting machine. If the junk traffic becomes too much, the server struggles to process all requests and eventually goes offline.<\/p>\n\n\n\n<p>DDoS is one of the<strong> cheapest forms of cybercrime<\/strong>, and because attacks don&#8217;t result in any direct data theft, many people are left with the misconception that it is relatively harmless. In light of this, you may be amazed to learn how much effort goes into creating the infrastructure that powers DDoS attacks.<\/p>\n\n\n\n<p>The DDoS lifecycle starts long before the target is even identified.<\/p>\n\n\n\n<p>First, the attacker needs to create a <strong>botnet<\/strong> \u2013 a vast network of compromised computers, servers, and other internet-connected devices. Cybercriminals infect thousands of nodes (often referred to as <em>zombies<\/em>) and control them via a <strong>Command &amp; Control (C&amp;C)<\/strong> <strong>server<\/strong>.<\/p>\n\n\n\n<p>The malware they use is usually pretty stealthy, and users are none the wiser to its existence. When the C&amp;C sends instructions, the zombie starts sending <strong>as many requests as possible to the targeted server<\/strong>. Multiply this by thousands, and you have an enormous traffic spike. If the target is unprepared &#8211; it doesn&#8217;t stand any chance.<\/p>\n\n\n\n<p>The motives behind DDoS attacks are extremely diverse.<\/p>\n\n\n\n<p>Cybercriminals can use DDoS as retaliation, often employing it to <strong>make a point<\/strong> or<strong> draw attention to a particular problem<\/strong>. Every now and again, you might find business organizations aiming DDoS attacks at their competitors, especially prevalent in the <strong>gaming community<\/strong>. Far too often, cybercriminals may DDoS a website or a server even out of pure spite.<\/p>\n\n\n\n<p>Whatever the motive, DDoS is a serious threat.<\/p>\n\n\n\n<p>Every second of downtime and every user disappointed with your website&#8217;s performance is<strong> costing you money<\/strong>. Frequent, prolonged, or severe DDoS attacks could cause major damage, so you need to be familiar with the threat and know what you can do to protect yourself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"types\"><strong>Types of DDoS Attacks<\/strong><\/h2>\n\n\n\n<p>The goal and general principles of all DDoS attacks may be the same, but the techniques, technologies, and scope of damages vary wildly. Some categorization of DDoS attacks and the problems they cause should give you a clearer understanding of how the threat works and what system administrators should look out for.<\/p>\n\n\n\n<p>There are three general categories of DDoS attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Volumetric DDoS attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>This is the most common type of DDoS attack. The attacker establishes a large number of simultaneous connections and sends a massive volume of packets to the server in an attempt to use up the target&#8217;s bandwidth, put an extreme load on the hardware resources, and cause the network equipment to fail.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Application DDoS flood attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>These are the attacks most commonly aimed at web servers and websites. Instead of packets and connections, the attacker floods the target with <strong>HTTP requests<\/strong> in an attempt to overwhelm the web server and cause it to crash.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Low-Rate DoS Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>This is a slightly different form of <strong>Denial of Service (DoS) activity.<\/strong> Unlike traditional DDoSing, it tries to exploit flaws in specific applications&#8217; design and implementation. Usually, hackers rely on fewer simultaneous connections in this type of attack.<\/p>\n\n\n\n<p>There are several distinguished categories of DDoS attacks based on the utilized protocol:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ICMP Floods<\/strong><\/li>\n<\/ul>\n\n\n\n<p>One of the oldest forms of DDoS attacks tries to overwhelm the target using the <strong>Internet Control Message Protocol.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Smurf Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>This is another way of targeting the ICMP protocol. This time, the attacker spoofs the <strong>target&#8217;s IP <\/strong>and sends an<strong> ICMP request<\/strong> to which other devices on the network respond and inadvertently flood the target with traffic.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SYN Flood Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>SYN Flood Attacks exploit the <strong>TCP&#8217;s three-way handshake<\/strong>. The attacker sends a large number of spoofed SYN packets to which the targeted server has to respond.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>UDP Flood Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Typically using a spoofed IP address, the attacker sends a lot of <strong>UDP packets<\/strong> to random ports on the targeted system. Because no other services use the said ports, the server responds with many <strong>ICMP packets<\/strong>, pushing the load up.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Teardrop Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The attacker sends many fragmented and oversized TCP\/IP packets that older operating systems can&#8217;t process. Often, the result is an instant crash.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DNS Amplification Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The attacker sends requests to the <strong>worldwide DNS system<\/strong> and spoofs them, so they look like they&#8217;re coming from the target&#8217;s IP address. The requests are designed to initiate a large response from the DNS resolvers, which is sent the victim&#8217;s way.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SIP Invite Flood Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Session Initiation Protocol (SIP) is the standard protocol for <strong>VoIP communication.<\/strong> Attackers use it in their DDoS efforts by sending many spoofed invite SIP messages.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SSL DDoS Attacks<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Some attackers even target SSL certificates in their campaigns as the additional task of <strong>decrypting the processed information<\/strong> uses up more CPU power. Additionally, some of the older mitigation techniques don&#8217;t work against SSL traffic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"do\"><strong>What to Do in Case of a DDoS Attack?<\/strong><\/h2>\n\n\n\n<p>Because hackers use vast botnets of devices, it&#8217;s tough to determine whether a particular network packet is coming from a legit visitor or a zombie instructed to flood it with traffic.<\/p>\n\n\n\n<p>As far as your server is concerned, many people are simultaneously trying to access the same resource. Despite the obvious challenges, your preparation and timely response are vital in protecting your site from prolonged downtime and permanent damage to your brand reputation.&nbsp;<\/p>\n\n\n\n<p>Here are a few things you can do:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Get more bandwidth than you&#8217;ll ever need<\/strong><\/li>\n<\/ul>\n\n\n\n<p>It&#8217;s not easy to estimate precisely how much bandwidth you&#8217;ll need, especially if you&#8217;re starting your first-ever online project. In any case, in the event of a DDoS attack, all calculations go out the window. Nevertheless, the more bandwidth your hosting account comes with, <strong>the more time you&#8217;ll have to react.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Get to know your site&#8217;s usual traffic patterns<\/strong><\/li>\n<\/ul>\n\n\n\n<p>If you know how much traffic your site receives regularly, you&#8217;ll be much better equipped to<strong> spot anomalies and unusual spikes<\/strong>, which usually signal the start of a DDoS attack. Detecting the attack as early as possible puts you in a better position to take adequate damage mitigation measures.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Take proactiv\u0435 measures if you own the network<\/strong><\/li>\n<\/ul>\n\n\n\n<p>If you host the server on your own network, you can do several things to mitigate the damage. For example, you can <strong>put<\/strong> <strong>rate limits<\/strong> at your router, <strong>add filters<\/strong> if the junk traffic&#8217;s source is obvious, <strong>set your network equipment<\/strong> to drop malformed packets, and <strong>lower limits for<\/strong> <strong>SYN, ICMP,<\/strong> and <strong>UDP connections.<\/strong><\/p>\n\n\n\n<p>All these are important points to consider, especially if you&#8217;re going to take care of most server management tasks yourself. However, most people are not willing to do all the legwork on their own and instead rely on their host to protect them in case of a DDoS emergency.<\/p>\n\n\n\n<p>You can easily see why&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"role\"><strong>The Role of Your Hosting Provider<\/strong><\/h2>\n\n\n\n<p>If you&#8217;re under a DDoS attack, your hosting provider wants to stop it just as much as you do. It costs them a lot of expensive bandwidth, and the potential outages may cause them to miss their uptime guarantee. If this happens &#8211; costly compensations are due. The <strong>reputation damage<\/strong> could be even worse than the <strong>financial<\/strong> one, especially if the attack starts affecting other customers.<\/p>\n\n\n\n<p>If the DDoS attack volume is too big, the host will eventually <strong>null route the requests to your site<\/strong>. This means all packets coming to it will be dropped before they arrive at their destination, and your website will become inaccessible. This is the worst-case scenario everyone wants to avoid.<\/p>\n\n\n\n<p>To do it, hosting providers undertake a number of safety measures:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DDoS run books (or playbooks)<\/strong><\/li>\n<\/ul>\n\n\n\n<p>In essence, a DDoS playbook is an incident response plan. It&#8217;s a <strong>step-by-step guide<\/strong> on who needs to do what in a DDoS attack.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Traffic scrubbing services<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The prevalence of DDoS attacks has opened a business niche for <strong>DDoS protection services<\/strong>. During an attack, a DDoS protection service uses many different factors to <strong>filter malicious traffic <\/strong>and keep the site online for legitimate users. It&#8217;s up to your host to redirect the traffic through it.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access Control Lists<\/strong><\/li>\n<\/ul>\n\n\n\n<p>An Access Control List (ACL) is a set of rules every packet needs to adhere to if it is to reach its destination on the network. The host can implement ACLs in the <strong>firewall<\/strong>, a <strong>router<\/strong>, and even a <strong>switch<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unicast Reverse Path Forwarding<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Unicast Reverse Path Forwarding limits malicious traffic by checking whether the source <a href=\"https:\/\/www.scalahosting.com\/blog\/what-is-my-ip\/\"><strong>IP address<\/strong><\/a> is reachable. If not &#8211; the server will drop the packet. This helps network administrators minimize packets from spoofed source IPs.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>State-of-the-art firewalls<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The firewall is the most commonly used <strong>device for<\/strong> <strong>filtering traffic<\/strong> coming to and from the network. Modern firewalls offer a <strong>deep packet inspection<\/strong> functionality that examines every single request in detail and drops the ones that look suspicious.<\/p>\n\n\n\n<p>This list is far from extensive but still outlines some of the essential precautions that hosts should take to protect their servers against DDoS attacks.<\/p>\n\n\n<div class=\"shortcode-cta-new-wrap row cloudvps\">\r\n    <img decoding=\"async\" class=\"shortcode-logo\" src=\"\/blog\/images\/shortcode-bg-new-logo-cloudvps.svg\" alt=\"shortcode-logo\" title=\"shortcode-logo\"\/>\r\n    <div class=\"shortcode-cta-img col-10 col-sm-7 col-md-5\">\r\n        <img decoding=\"async\" class=\"shortcode-bg\" src=\"\/blog\/images\/shortcode-bg-new-cloudvps.webp\" alt=\"shortcode-bg\" title=\"shortcode-bg\"\/>\r\n    <\/div>\r\n    <div class=\"shortcode-cta-content col-12 col-md-7\">\r\n        <div class=\"content\">\r\n            <div class=\"heading\">Supercharge Your Business with an All-inclusive Fully Managed Cloud<\/div>\r\n            <div class=\"list-wrap\">\r\n                <div class=\"list\">\r\n                    <div><b>Free, Effortless & No-Downtime Migration<\/b><\/div>\r\n                    <div><b>Anytime Unconditional Money-back Guarantee<\/b><\/div>\r\n                    <div><b>Full Scalability & 24\/7 Expert Cloud Support<\/b><\/div>\r\n                <\/div>\r\n            <\/div>\r\n            <div class=\"btn-wrap row\">\r\n                <div class=\"col-auto\">\r\n                    <a class=\"button green\" href=\"https:\/\/www.scalahosting.com\/managed-cloud-hosting.html\">Start Now<\/a>\r\n                <\/div>\r\n                <div class=\"col-auto\">\r\n                    <button class=\"button brown_outer\" title=\"Contact Sales\" onclick=\"chatChangeVisibility(this, 'maximize', {}, 5);\">Chat with our Experts<\/button>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Today&#8217;s cybersecurity landscape allows pretty much anyone to launch an attack that brings an entire server down. DDoS services are readily available on underground markets, and employing them requires no technical knowledge whatsoever.<\/p>\n\n\n\n<p>Meanwhile, the damages from DDoS attacks can be pretty devastating for both website owners and <a href=\"https:\/\/www.scalahosting.com\/blog\/become-hosting-provider\/\"><strong>hosting providers<\/strong><\/a>. Luckily, preparing to fend off such threats from the start can easily ensure your online comfort for a long time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"faq\"><strong>FAQ<\/strong><\/h2>\n\n\n\n<p><strong>Q:<\/strong> <strong>Is DDoSing illegal?<\/strong><\/p>\n\n\n\n<p><strong>A:<\/strong> Different countries have different laws, but DDoS attacks are universally<strong> recognized as a form of cybercrime<\/strong>. Such hacker attempts are deemed illegal in the US and can be considered a federal crime under the Computer Fraud and Abuse Act (CFAA).<\/p>\n\n\n\n<p><strong>Q:<\/strong> <strong>What are DDoS attacks used for?<\/strong><\/p>\n\n\n\n<p><strong>A:<\/strong> DDoSing can be used for anything &#8211; from pulling a friendly prank to sabotaging a global organization. DDoS attacks are often used by<strong> hacktivists<\/strong> who want to draw attention to a particular problem and business organizations that want to hit their competitors.<\/p>\n\n\n\n<p><strong>Q:<\/strong> <strong>How do DDoS attacks work?<\/strong><\/p>\n\n\n\n<p><strong>A:<\/strong> A DDoS attack aims to bring a website or an online service down by <strong>flooding the hosting server and its network<\/strong> <strong>with traffic<\/strong>. To achieve the traffic volume required to bring a website down, criminals use botnets \u2013 vast networks of infected computers, servers, and other devices spread worldwide.<\/p>\n\n\n\n<p><strong>Q:<\/strong> <strong>How long does a DDoS attack last?<\/strong><\/p>\n\n\n\n<p><strong>A:<\/strong> Hosting providers and website owners can take specific measures to <strong>filter and block the junk traffic<\/strong>, but they can do nothing to stop <strong>the botnet <\/strong>from sending waves upon waves of new requests. That&#8217;s why a DDoS attack can last as long as the attacker wishes (and has the needed resources) &#8211; we&#8217;ve seen some threats go out in an hour, and some have taken days to mitigate.<\/p>\n\n\n\n<p class=\"youtube-player\" id=\"FFSS0rkS1do\">ScalaHosting &#8211; Cyber Attack Guide \u2013 DDoS Attacks<\/p>\n\n\n\n<script type=\"application\/ld+json\">\n    {\n        \"@context\": \"https:\/\/schema.org\",\n        \"@type\": \"VideoObject\",\n        \"name\": \"Cyber Attack Guide \u2013 DDoS Attacks\",\n        \"description\": \"Quite a lot of people plunge head-first into their new project and try to build their first websites without considering all the factors involved. Security is overlooked alarmingly often, and as a result, far too many projects come to a quick and completely avoidable end.\",\n        \"thumbnailUrl\": [\n            \"https:\/\/www.scalahosting.com\/blog\/wp-content\/uploads\/2022\/02\/Cyber-Attack-Guide-\u2013-DDoS-Attacks.png\"\n        ],\n        \"uploadDate\": \"2021-08-11\",\n        \"duration\": \"PT3M00S\",\n        \"embedUrl\": \"https:\/\/youtu.be\/FFSS0rkS1do\"\n    }\n<\/script>\n\n\n\n<script type=\"application\/ld+json\">\n    {\n      \"@context\": \"https:\/\/schema.org\",\n      \"@type\": \"FAQPage\",\n      \"mainEntity\": [{\n        \"@type\": \"Question\",\n        \"name\": \"Is DDoSing illegal?\",\n        \"acceptedAnswer\": {\n          \"@type\": \"Answer\",\n          \"text\": \"DDoSing can be used for anything from pulling a friendly prank to sabotaging a global organization. DDoS attacks are often used by hacktivists who want to draw attention to a particular problem and also by business organizations that want to hit their competitors.\"\n        }\n      }, {\n        \"@type\": \"Question\",\n        \"name\": \"What are DDoS attacks used for?\",\n        \"acceptedAnswer\": {\n          \"@type\": \"Answer\",\n          \"text\": \"Some hosting providers offer free cPanel VPS hosting. Keep in mind, though, that these plans are often less usable and sometimes dangerous to use. In the worst-case scenarios, you may find your data sold to third parties.\"\n        }\n      },{\n        \"@type\": \"Question\",\n        \"name\": \"How do DDoS attacks work?\",\n        \"acceptedAnswer\": {\n          \"@type\": \"Answer\",\n          \"text\": \"A DDoS attack aims to bring a website or an online service down by flooding the server and the network that hosts it with traffic. To achieve the volume of traffic required to bring a website down, criminals use botnets \u2013 vast networks of infected computers, servers, and other devices spread worldwide.\"\n        }\n      },{\n        \"@type\": \"Question\",\n        \"name\": \"How long does a DDoS attack last?\",\n        \"acceptedAnswer\": {\n          \"@type\": \"Answer\",\n          \"text\": \"It's entirely up to the attacker. Hosting providers and website owners can take specific measures to filter and block the junk traffic, but they can do nothing to stop the botnet from sending waves upon waves of new requests.\"\n        }\n      }]\n    }<\/script>\n\n\n\n<p class=\"youtube-player\" id=\"4zZiFTQoXRM\">What is a VPS &#8211; Everything you need to know!<\/p>\n\n\n\n<script type=\"application\/ld+json\">\r\n    {\r\n        \"@context\": \"https:\/\/schema.org\",\r\n        \"@type\": \"VideoObject\",\r\n        \"name\": \"What is a VPS - Everything you need to know!\",\r\n        \"description\": \"In this video we'll explain what is a VPS, how does it work and why you might need one. A lot of poeple are familiar with shared hosting nowdays so we'll compare these two options so it's easy to understand.\",\r\n        \"thumbnailUrl\": [\r\n            \"https:\/\/i3.ytimg.com\/vi\/4zZiFTQoXRM\/maxresdefault.jpg\"\r\n        ],\r\n        \"uploadDate\": \"2022-04-11\",\r\n        \"duration\": \"PT4M19S\",\r\n        \"embedUrl\": \"https:\/\/www.youtube.com\/watch?v=4zZiFTQoXRM\"\r\n    }\r\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Quite a lot of people plunge head-first into their new project and try to build their first websites without considering &#8230;<\/p>\n","protected":false},"author":113,"featured_media":61518,"comment_status":"open","ping_status":"closed","sticky":false,"template":"single-cluster-vps.php","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"A series of ScalaHosting Cybersecurity Guides. The hot topic today is DDoS Attacks - what they are, what they do, and what you can do to prevent them...","_seopress_robots_index":"","footnotes":""},"categories":[61],"tags":[],"class_list":["post-61516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-hosting"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts\/61516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/users\/113"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/comments?post=61516"}],"version-history":[{"count":13,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts\/61516\/revisions"}],"predecessor-version":[{"id":72922,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/posts\/61516\/revisions\/72922"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/media\/61518"}],"wp:attachment":[{"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/media?parent=61516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/categories?post=61516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scalahosting.com\/blog\/wp-json\/wp\/v2\/tags?post=61516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}