{"id":1993,"date":"2018-11-13T00:00:00","date_gmt":"2018-11-13T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/holiday-season-is-ddos-season"},"modified":"2023-05-11T15:36:03","modified_gmt":"2023-05-11T22:36:03","slug":"holiday-season-is-ddos-season","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/","title":{"rendered":"Holiday season is DDoS season"},"content":{"rendered":"<p><em>Is your business ready for the holiday season?<\/em><\/p>\n<p>As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff. All of which makes this time of year too attractive for cyber-criminals to pass up.<\/p>\n<p>In fact, security firms report a 150 percent increase in DDoS attacks in the months between summer and the end of the year. DDoS is becoming an unfortunate and inevitable addition to the holidays.<\/p>\n<p>DDoS is an ever-growing problem, and the types of attacks are getting increasingly sophisticated. More importantly, DDoS attacks are often used as a \u201csmokescreen,\u201d masking more malicious and harmful infiltration of your resources. The technology to create DDoS attacks continues to increase in sophistication while the cost and ability to instigate these attacks get more and more accessible. Therefore, driving up the frequency and ease at which criminals can wreak havoc on businesses and users.<\/p>\n<p>Readily available DDoS toolkits, botnet-for-hire services and an explosion of inadequately secured IoT devices, make every organization a potential target. No online network, application, service, or website is immune to the DDoS threat.<\/p>\n<p>Azure offers solutions to protect your valuable digital assets from these cyber-attacks during the holidays and throughout the year. <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/ddos-protection\/\" target=\"_blank\" rel=\"noopener\">Azure DDoS Protection<\/a> provides countermeasures against the most sophisticated DDoS threats. The service provides enhanced DDoS mitigation capabilities for your application and resources deployed in your virtual networks. Additionally, customers using Azure DDoS Protection has access to DDoS Rapid Response support to engage DDoS experts during an active attack. You can easily enable DDoS Protection for your resources to proactively protect against DDoS attacks!<\/p>\n<h2>Protect your applications against DDoS attacks in three steps:<\/h2>\n<p><strong>1. Evaluate risks<\/strong> for your Azure applications. This is the time to understand the scope of your risk from a DDoS attack if you haven\u2019t done so already.<\/p>\n<p align=\"left\"><strong>a.<\/strong> If there are <strong>virtual networks with applications exposed over the public Internet,<\/strong> <strong>we strongly recommend<\/strong> enabling <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/manage-ddos-protection\" target=\"_blank\" rel=\"noopener\">DDoS Protection<\/a> on those virtual networks. Resources in a virtual network that requires protection against DDoS attacks are Application Gateway\/WAF, Load Balancer, virtual machines, and Azure Firewall. Review \u201c<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/azure-ddos-best-practices#ddos-protection-reference-architectures\" target=\"_blank\" rel=\"noopener\">DDos Protection reference architectures<\/a>\u201d to get more details on reference architectures to protect resources in virtual networks against DDoS attacks.<\/p>\n<p><strong>i.<\/strong> This <a href=\"https:\/\/github.com\/Anupamvi\/Azure-DDoS-Protection\/blob\/master\/Vnet%20enumeration.ps1\" target=\"_blank\" rel=\"noopener\">PowerShell script<\/a> will iterate all VNets overall subscriptions to which a user has access, and will output two tables, VNets with DDoS Protection enabled and VNets with DDoS Protection disabled.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"DDOSDemoVNET\" height=\"518\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp\" title=\"DDOSDemoVNET\" width=\"1236\"><\/p>\n<p><strong>b.<\/strong> You must<strong> ensure your applications don\u2019t have a single point of failure<\/strong> and can <strong>auto-scale<\/strong> as the traffic volume increases during the peak period. Refer to the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/azure-ddos-best-practices\" target=\"_blank\" rel=\"noopener\">fundamental best practices<\/a> for building DDoS-resilient services in Azure for more details.<\/p>\n<p><strong>c.<\/strong> Use <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/security-overview\" target=\"_blank\" rel=\"noopener\">network security groups<\/a> (NSGs) to block unwanted ports minimizing attack footprint of your applications.<\/p>\n<p><strong>2. Validate your assumptions.<\/strong> Planning and preparation are crucial to understanding how a system will perform during a DDoS attack. You should be proactive to defend against DDoS attacks and not wait for an attack to happen and then act.<\/p>\n<p><strong>a.<\/strong> It is essential that you <strong>understand the normal behavior of an application<\/strong> and prepare to act if the application is not behaving as expected during a DDoS attack. Have monitors configured for your business-critical applications that mimic client behavior, and notify you when relevant anomalies are detected. Refer to <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/best-practices\/monitoring#monitoring-and-diagnostics-scenarios\" target=\"_blank\" rel=\"noopener\">monitoring and diagnostics best practices<\/a> to gain insights on the health of your application.<\/p>\n<p><strong>b.<\/strong> <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/application-insights\/app-insights-overview\" target=\"_blank\" rel=\"noopener\">Azure Application Insights<\/a> is an extensible application performance management (APM) service for web developers on multiple platforms. Use Application Insights to monitor your live web application. It automatically detects performance anomalies. It includes analytics tools to help you diagnose issues and to understand what users do with your app. It&#8217;s designed to help you continuously improve performance and usability.<\/p>\n<p><strong>c.<\/strong> Finally, <strong>test your assumptions<\/strong> about how your services will respond to an attack by generating traffic against your applications to <strong>simulate DDoS attack<\/strong>. <strong>Don\u2019t wait for an actual attack to happen!<\/strong> We have partnered with Ixia, a Keysight company, to provide a <a href=\"https:\/\/www.ixiacom.com\/products\/breakingpoint-cloud\" target=\"_blank\" rel=\"noopener\">self-service traffic generator (BreakingPoint Cloud)<\/a> that allows Azure DDoS Protection customers to simulate DDoS test traffic against their Azure public endpoints.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"DDoS Test Configuration\" height=\"327\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/b681d601-881d-44db-a3d0-2354a0c2b094.webp\" title=\"DDoS Test Configuration\" width=\"640\"><\/p>\n<p><strong>3. Configure Alerts and Attack Analytics.<\/strong> Azure DDoS Protection identifies and mitigates DDoS attacks without any user intervention.<\/p>\n<p><strong>a.<\/strong> To get notified when there\u2019s an active mitigation for a protected public IP, we recommend <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/manage-ddos-protection#configure-alerts-for-ddos-protection-metrics\" target=\"_blank\" rel=\"noopener\">configuring an alert<\/a> on the metric Under DDoS attack or not.<\/p>\n<p><strong>b.<\/strong> You can additionally choose to create alerts for the other DDoS metrics and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/manage-ddos-protection#configure-ddos-attack-analytics\" target=\"_blank\" rel=\"noopener\">configure attack analytics<\/a> to understand the scale of the attack, traffic being dropped, and other details.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Attack analysis\" height=\"520\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/99971df3-5633-43b9-82dd-2605c3dd05e1.webp\" title=\"Attack analysis\" width=\"1625\"><\/p>\n<h2>When to contact Microsoft support<\/h2>\n<ul>\n<li>During a DDoS attack if you find that the performance of the protected resource is severely degraded, or the resource is not available. <strong>Review step 2 <\/strong>above on configuring monitors to detect resource availability and performance issues.<\/li>\n<li>You think your resource is under DDoS attack, but DDoS Protection service is not mitigating the attack effectively.<\/li>\n<li>You&#8217;re planning a viral event that will significantly increase your network traffic.<\/li>\n<\/ul>\n<p>For attacks that have a critical business impact, <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/ddos-protection-attack-analytics-rapid-response\/\" target=\"_blank\" rel=\"noopener\">create a severity-A support ticket<\/a> to engage DDoS Rapid Response team.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1457],"tags":[],"audience":[3053,3056],"content-type":[1511],"product":[1500],"tech-community":[],"topic":[],"coauthors":[42],"class_list":["post-1993","post","type-post","status-publish","format-standard","hentry","category-networking","audience-it-decision-makers","audience-it-implementors","content-type-best-practices","product-azure-ddos-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Holiday season is DDoS season | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Holiday season is DDoS season | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-13T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T22:36:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp\" \/>\n<meta name=\"author\" content=\"Anupam Vij\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anupam Vij\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/anupam-vij\/\",\"@type\":\"Person\",\"@name\":\"Anupam Vij\"}],\"headline\":\"Holiday season is DDoS season\",\"datePublished\":\"2018-11-13T00:00:00+00:00\",\"dateModified\":\"2023-05-11T22:36:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\"},\"wordCount\":896,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp\",\"articleSection\":[\"Networking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\",\"name\":\"Holiday season is DDoS season | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp\",\"datePublished\":\"2018-11-13T00:00:00+00:00\",\"dateModified\":\"2023-05-11T22:36:03+00:00\",\"description\":\"As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/networking\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Holiday season is DDoS season\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Holiday season is DDoS season | Microsoft Azure Blog","description":"As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/","og_locale":"en_US","og_type":"article","og_title":"Holiday season is DDoS season | Microsoft Azure Blog","og_description":"As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2018-11-13T00:00:00+00:00","article_modified_time":"2023-05-11T22:36:03+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp","type":"","width":"","height":""}],"author":"Anupam Vij","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Anupam Vij","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/anupam-vij\/","@type":"Person","@name":"Anupam Vij"}],"headline":"Holiday season is DDoS season","datePublished":"2018-11-13T00:00:00+00:00","dateModified":"2023-05-11T22:36:03+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/"},"wordCount":896,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp","articleSection":["Networking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/","name":"Holiday season is DDoS season | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp","datePublished":"2018-11-13T00:00:00+00:00","dateModified":"2023-05-11T22:36:03+00:00","description":"As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for hackers is the combination of an increase in traffic volume due to an uptick in eCommerce that helps disguise hackers from detection, and reduced staff.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/11\/4aa8d2a0-d736-459b-89db-bb2972d5d551.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/holiday-season-is-ddos-season\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/networking\/"},{"@type":"ListItem","position":3,"name":"Holiday season is DDoS season"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=1993"}],"version-history":[{"count":0,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1993\/revisions"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=1993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=1993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=1993"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=1993"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=1993"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=1993"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=1993"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=1993"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=1993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}