{"id":70702,"date":"2021-03-24T10:16:14","date_gmt":"2021-03-24T17:16:14","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=70702"},"modified":"2021-09-08T02:00:43","modified_gmt":"2021-09-08T09:00:43","slug":"ddos-attack-work","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/","title":{"rendered":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes"},"content":{"rendered":"<h2><strong>What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes<\/strong><\/h2>\n<p>Imagine you\u2019re driving down a highway to get to work. There are other cars on the road, but by and large everyone is moving smoothly at a crisp, legal speed limit. Then, as you approach an entry ramp, more cars join. And then more, and more, and more until all of the sudden traffic has slowed to a crawl. This illustrates a DDoS attack.<\/p>\n<p>DDoS stands for Distributed Denial of Service, and it\u2019s a method where cybercriminals flood a network with so much malicious traffic that it cannot operate or communicate as it normally would. This causes the site\u2019s normal traffic, also known as legitimate packets, to come to a halt. DDoS is a simple, effective and powerful technique that\u2019s fueled by insecure devices and poor digital habits. Luckily, with a few easy tweaks to your everyday habits, you can safeguard your personal devices against DDoS attacks.<\/p>\n<h3><strong>DDoS Attacks Are on the Rise<\/strong><\/h3>\n<p>The expansion of 5G, proliferation of IoT and smart devices, and shift of more industries moving their operations online have presented <a href=\"https:\/\/www.securitymagazine.com\/articles\/94570-ddos-attacks-intensify-driven-in-part-by-covid-19-and-5g\" target=\"_blank\" rel=\"noopener noreferrer\">new opportunities for DDoS attacks<\/a>. Cybercriminals are taking advantage, and 2020 saw two of the largest DDoS offensives ever recorded. In 2020, ambitious attacks were launched on Amazon and Google. There is no target too big for cybercriminals.<\/p>\n<p>DDoS attacks are one of the more troubling areas in cybersecurity, because they\u2019re incredibly difficult to prevent and mitigate.. Preventing these attacks is particularly difficult because malicious traffic isn\u2019t coming from a single source. There are an estimated 12.5 million devices that are vulnerable to being recruited by a DDoS attacker.<\/p>\n<h3><strong>Personal Devices Become DDoS Attack Soldiers<\/strong><\/h3>\n<p>DDoS attacks are fairly simple to create. All it takes are two devices that coordinate to send fake traffic to a server or website. That\u2019s it. Your laptop and your phone, for example, could be programmed to form their own DDoS network (sometimes referred to as a botnet, more below). However, even if two devices dedicate all of their processing power in an attack, it still isn\u2019t enough to take down a website or server. Hundreds and thousands of coordinated devices are required to take down\u00a0<a href=\"https:\/\/mcafee.com\/blogs\/consumer\/consumer-threat-notices\/iot-devices-ddos-attack\/\">an entire service provider<\/a>.<\/p>\n<p>To amass a network of that size, cybercriminals create what\u2019s known as a \u201c<a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/what-is-a-botnet\">botnet<\/a>,\u201d a network of compromised devices that coordinate to achieve a particular task. Botnets don\u2019t always have to be used in a DDoS attack, nor does a DDoS have to have a botnet to work, but more often than not they go together like Bonnie and Clyde. Cybercriminals create botnets through fairly typical means: tricking people into downloading malicious files and spreading\u00a0<a href=\"https:\/\/mcafee.com\/blogs\/consumer\/malware-5-tips-fighting-malicious-software\/\">malware<\/a>.<\/p>\n<p>But malware isn\u2019t the only means of recruiting devices. Because a good deal of companies and consumers practice poor password habits, malicious actors can scan the internet for connected devices with known factory credentials or\u00a0<a href=\"https:\/\/mcafee.com\/blogs\/consumer\/consumer-threat-notices\/are-you-stressed-out-about-passwords-consider-a-simple-option\/\">easy-to-guess passwords<\/a>\u00a0(\u201cpassword,\u201d for example). Once logged in, cybercriminals can easily infect and recruit the device into their cyber army.<\/p>\n<h3><strong>Why DDoS Launches Are Often Successful<\/strong><\/h3>\n<p>These recruited cyber armies can lie dormant until they\u2019re given orders. This is where a specialized server called a command and control server (typically abbreviated as a \u201cC2\u201d) comes into play. When instructed, cybercriminals will order a C2 server to issue instructions to compromised devices. Those devices will then use a portion of their processing power to send fake traffic to a targeted server or website and,\u00a0<em>voila<\/em>!<em>\u00a0<\/em>That\u2019s how a DDoS attack is launched.<\/p>\n<p>DDoS attacks are usually successful because of their distributed nature, and the difficulty in discerning between legitimate users and fake traffic. They do not, however, constitute a breach. This is because DDoS attacks overwhelm a target to knock it offline \u2014 not to steal from it. Usually DDoS attacks will be deployed as a means of retaliation against a company or service, often for political reasons. Sometimes, however, cybercriminals will use DDoS attacks as a smokescreen for more serious compromises that may eventually lead to a full-blown breach.<\/p>\n<h3><strong>3 Ways to Prevent Your Devices from Being Recruited<\/strong><\/h3>\n<p>DDoS attacks are only possible because devices can be easily compromised. Here are three ways you can prevent your devices from participating in a DDoS attack:<\/p>\n<ol>\n<li><strong>Secure your router:<\/strong>\u00a0Your Wi-Fi router is the gateway to your network. Secure it by changing the default password. If you\u2019ve already thrown out the instructions for your router and aren\u2019t sure how to do this, consult the internet for instructions on how to do it for your specific make and model, or call the manufacturer. And remember, protection can start within your router, too. Solutions such as\u00a0McAfee Secure Home Platform, which is embedded within select routers, help you easily manage and protect your network.<\/li>\n<li><strong>Change default passwords on IoT devices:<\/strong>\u00a0Many Internet of Things (IoT) devices, smart objects that connect to the internet for increased functionality and efficiency, come with default usernames and passwords. The very first thing you should do after taking your IoT device out of the box is change those default credentials. If you\u2019re unsure of how to change the default setting on your IoT device, refer to setup instructions or do a bit of research online.<\/li>\n<li><strong>Use comprehensive security:<\/strong>\u00a0Many botnets are coordinated on devices without any built-in security. Comprehensive security solutions, like\u00a0<u><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Total Protection<\/a><\/u>, can help secure your most important digital devices from known malware variants. If you don\u2019t have a security suite protecting your devices, take the time to do your research and commit to a solution you trust.<\/li>\n<\/ol>\n<p>Now that you know what a DDoS attack is and how to protect against it, you\u2019re better equipped to keep your personal devices and safe and secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you\u2019re driving down a highway&#8230;<\/p>\n","protected":false},"author":674,"featured_media":119329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661],"tags":[49,7531,7537,4131,7534],"coauthors":[3973],"class_list":["post-70702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","tag-botnet","tag-ddos-attack-example","tag-ddos-attack-meaning","tag-internet-of-things","tag-whats-a-ddos-attack"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes | McAfee Blog What is a DDoS attack and how does it work? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you\u2019re driving down a highway to get to work. There are other cars on Learn about DDoS attacks, how cybercriminals coordinate malicious traffic offensives, and how you can protect your personal devices from being roped into their criminal efforts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes | McAfee Blog What is a DDoS attack and how does it work? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you\u2019re driving down a highway to get to work. There are other cars on Learn about DDoS attacks, how cybercriminals coordinate malicious traffic offensives, and how you can protect your personal devices from being roped into their criminal efforts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-24T17:16:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-08T09:00:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"342\" \/>\n\t<meta property=\"og:image:height\" content=\"244\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes\",\"datePublished\":\"2021-03-24T17:16:14+00:00\",\"dateModified\":\"2021-09-08T09:00:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/\"},\"wordCount\":980,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg\",\"keywords\":[\"botnet\",\"ddos attack example\",\"ddos attack meaning\",\"Internet of Things\",\"what\u2019s a ddos attack\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/\",\"name\":\"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes | McAfee Blog What is a DDoS attack and how does it work? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg\",\"datePublished\":\"2021-03-24T17:16:14+00:00\",\"dateModified\":\"2021-09-08T09:00:43+00:00\",\"description\":\"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you\u2019re driving down a highway to get to work. There are other cars on Learn about DDoS attacks, how cybercriminals coordinate malicious traffic offensives, and how you can protect your personal devices from being roped into their criminal efforts\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg\",\"width\":342,\"height\":244,\"caption\":\"What is a DDoS attack?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes | McAfee Blog What is a DDoS attack and how does it work? | McAfee Blog","description":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you\u2019re driving down a highway to get to work. There are other cars on Learn about DDoS attacks, how cybercriminals coordinate malicious traffic offensives, and how you can protect your personal devices from being roped into their criminal efforts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes | McAfee Blog What is a DDoS attack and how does it work? | McAfee Blog","og_description":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you\u2019re driving down a highway to get to work. There are other cars on Learn about DDoS attacks, how cybercriminals coordinate malicious traffic offensives, and how you can protect your personal devices from being roped into their criminal efforts","og_url":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-03-24T17:16:14+00:00","article_modified_time":"2021-09-08T09:00:43+00:00","og_image":[{"width":342,"height":244,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes","datePublished":"2021-03-24T17:16:14+00:00","dateModified":"2021-09-08T09:00:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/"},"wordCount":980,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg","keywords":["botnet","ddos attack example","ddos attack meaning","Internet of Things","what\u2019s a ddos attack"],"articleSection":["How To Guides and Tutorials","Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/","url":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/","name":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes | McAfee Blog What is a DDoS attack and how does it work? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg","datePublished":"2021-03-24T17:16:14+00:00","dateModified":"2021-09-08T09:00:43+00:00","description":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you\u2019re driving down a highway to get to work. There are other cars on Learn about DDoS attacks, how cybercriminals coordinate malicious traffic offensives, and how you can protect your personal devices from being roped into their criminal efforts","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Cybersecurity-education-342.jpg","width":342,"height":244,"caption":"What is a DDoS attack?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/ddos-attack-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=70702"}],"version-history":[{"count":0,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70702\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/119329"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=70702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=70702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=70702"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=70702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}