{"id":19846,"date":"2024-01-18T09:51:19","date_gmt":"2024-01-18T07:51:19","guid":{"rendered":"https:\/\/www.genie.co.il\/?p=19846"},"modified":"2024-01-18T10:11:28","modified_gmt":"2024-01-18T08:11:28","slug":"ddos","status":"publish","type":"post","link":"https:\/\/www.genie.co.il\/en\/ddos\/","title":{"rendered":"denial of service (DDoS) attack"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19846\" class=\"elementor elementor-19846\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22f85d93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22f85d93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-195b509b\" data-id=\"195b509b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a546dc3 elementor-widget elementor-widget-text-editor\" data-id=\"7a546dc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a server, service, or network by flooding the target or the surrounding infrastructure with Internet traffic.<br \/>DDoS attacks gain effectiveness by using multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. A DDoS attack is like a sudden traffic jam that blocks the highway, preventing normal traffic from reaching its destination.<br \/><br \/>On October 7, 2023, at the same time as the missile attack, Hamas launched a significant cyber attack against Israeli websites, newspaper and media websites were the main target of DDoS attacks, they constitute 56% of all attacks against Israeli websites since the attack on October 7.<br \/><br \/>Hamas is not the only group responsible for the attacks. Various pro-Palestinian activist groups targeted a number of Israeli websites and mobile applications. For example, the AnonGhost attack group exploited a vulnerability in the &quot;Red Alert&quot; application. The exploit allowed them to intercept requests, expose servers and APIs, and send fake notifications to some of the app&#039;s users.<br \/><br \/><strong>Since October 7, DDoS attacks on Israeli websites have increased almost 10 times the average.<\/strong><br \/><strong><br \/>Who is it suitable for?!<\/strong><br \/>DDoS attacks can be devastating to businesses, especially those that rely on their online presence. If a business has a website or any other online service that is critical to their operations, it is recommended to invest in DDoS protection.<br \/>It is especially important if the business is in the financial, healthcare or government sectors, as these industries are often targeted by cybercriminals.<br \/><strong><br \/>How do you protect the organization from DDoS attacks?!<\/strong><br \/>DDoS defenses work by detecting and blocking malicious traffic before it reaches the target server or network. This is done by analyzing traffic patterns and filtering traffic that is considered suspicious or malicious.<br \/>DDoS protection services can also use rate limiting to slow down traffic and prevent it from overwhelming a target.<br \/><strong><br \/>Leading companies that offer protection tools against these attacks:<\/strong><br \/><strong>Imperva:<\/strong><br \/>Offers a comprehensive DDoS protection service that secures all edge assets without interruption.<br \/>The system provides immediate high-capacity DDoS mitigation with guaranteed uptime and no impact on performance. The system handles all incoming DNS requests, using a combination of reputation and heuristics.<br \/><strong>Radware:<\/strong><br \/>provides a comprehensive DDoS protection service called DefensePro, which can be tailored to your specific needs. It protects against IoT, Burst, DNS and TLS\/SSL based attacks to secure organizations against multi-vector attacks on the network.<br \/><strong>Cloudflare:<\/strong><br \/>Offers three DDoS protection solutions for internet, application and network threats: Website, Spectrum and Magic Transit<br \/>Website DDoS Protection \u2013 Web Services (L7)<br \/>Application DDoS Protection \u2013 Spectrum (L4)<br \/>Network DDoS Protection \u2013 Magic Transit (L3<br \/><strong><br \/>The author: Zabri Idan, VP of expert services and information security at Genie<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS) \u05d4\u05d9\u05d0 \u05e0\u05d9\u05e1\u05d9\u05d5\u05df \u05d6\u05d3\u05d5\u05e0\u05d9 \u05dc\u05e9\u05d1\u05e9 \u05d0\u05ea \u05d4\u05ea\u05e2\u05d1\u05d5\u05e8\u05d4 \u05d4\u05e8\u05d2\u05d9\u05dc\u05d4 \u05e9\u05dc \u05e9\u05e8\u05ea, \u05e9\u05d9\u05e8\u05d5\u05ea \u05d0\u05d5 \u05e8\u05e9\u05ea \u05e2\u05dc \u05d9\u05d3\u05d9 \u05d4\u05e6\u05e4\u05ea \u05d4\u05d9\u05e2\u05d3 \u05d0\u05d5 \u05d4\u05ea\u05e9\u05ea\u05d9\u05ea \u05d4\u05e1\u05d5\u05d1\u05d1\u05ea \u05d0\u05d5\u05ea\u05d5 \u05ea\u05e2\u05d1\u05d5\u05e8\u05ea \u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8. \u05d4\u05ea\u05e7\u05e4\u05d5\u05ea DDoS \u05de\u05e9\u05d9\u05d2\u05d5\u05ea \u05d9\u05e2\u05d9\u05dc\u05d5\u05ea \u05e2\u05dc \u05d9\u05d3\u05d9 \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1\u05de\u05e1\u05e4\u05e8 \u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05de\u05d7\u05e9\u05d1 \u05e9\u05e0\u05e4\u05d2\u05e2\u05d5 \u05db\u05de\u05e7\u05d5\u05e8\u05d5\u05ea \u05dc\u05ea\u05e2\u05d1\u05d5\u05e8\u05ea \u05ea\u05e7\u05d9\u05e4\u05d4. \u05de\u05db\u05d5\u05e0\u05d5\u05ea \u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05dc\u05db\u05dc\u05d5\u05dc \u05de\u05d7\u05e9\u05d1\u05d9\u05dd \u05d5\u05de\u05e9\u05d0\u05d1\u05d9\u05dd \u05d0\u05d7\u05e8\u05d9\u05dd \u05d1\u05e8\u05e9\u05ea \u05db\u05d2\u05d5\u05df \u05d4\u05ea\u05e7\u05e0\u05d9 IoT. \u05de\u05ea\u05e7\u05e4\u05ea DDoS \u05d4\u05d9\u05d0 \u05db\u05de\u05d5 [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":19847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[111],"tags":[161,131],"class_list":["post-19846","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-articles","tag-genie","tag-131"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)<\/title>\n<meta name=\"description\" content=\"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS) \u05d4\u05d9\u05d0 \u05e0\u05d9\u05e1\u05d9\u05d5\u05df \u05d6\u05d3\u05d5\u05e0\u05d9 \u05dc\u05e9\u05d1\u05e9 \u05d0\u05ea \u05d4\u05ea\u05e2\u05d1\u05d5\u05e8\u05d4 \u05d4\u05e8\u05d2\u05d9\u05dc\u05d4 \u05e9\u05dc \u05e9\u05e8\u05ea, \u05e9\u05d9\u05e8\u05d5\u05ea \u05d0\u05d5 \u05e8\u05e9\u05ea \u05e2\u05dc \u05d9\u05d3\u05d9 \u05d4\u05e6\u05e4\u05ea \u05d4\u05d9\u05e2\u05d3 \u05d0\u05d5 \u05d4\u05ea\u05e9\u05ea\u05d9\u05ea \u05d4\u05e1\u05d5\u05d1\u05d1\u05ea \u05d0\u05d5\u05ea\u05d5 \u05ea\u05e2\u05d1\u05d5\u05e8\u05ea \u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genie.co.il\/en\/ddos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)\" \/>\n<meta property=\"og:description\" content=\"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS) \u05d4\u05d9\u05d0 \u05e0\u05d9\u05e1\u05d9\u05d5\u05df \u05d6\u05d3\u05d5\u05e0\u05d9 \u05dc\u05e9\u05d1\u05e9 \u05d0\u05ea \u05d4\u05ea\u05e2\u05d1\u05d5\u05e8\u05d4 \u05d4\u05e8\u05d2\u05d9\u05dc\u05d4 \u05e9\u05dc \u05e9\u05e8\u05ea, \u05e9\u05d9\u05e8\u05d5\u05ea \u05d0\u05d5 \u05e8\u05e9\u05ea \u05e2\u05dc \u05d9\u05d3\u05d9 \u05d4\u05e6\u05e4\u05ea \u05d4\u05d9\u05e2\u05d3 \u05d0\u05d5 \u05d4\u05ea\u05e9\u05ea\u05d9\u05ea \u05d4\u05e1\u05d5\u05d1\u05d1\u05ea \u05d0\u05d5\u05ea\u05d5 \u05ea\u05e2\u05d1\u05d5\u05e8\u05ea \u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genie.co.il\/en\/ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/genie.support\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T07:51:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-18T08:11:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2024\/01\/Genie_post_war-01-1024x1024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eyal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:site\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eyal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/\"},\"author\":{\"name\":\"Eyal\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/person\\\/1025ced5f0bbcccec1753c418a98c8be\"},\"headline\":\"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)\",\"datePublished\":\"2024-01-18T07:51:19+00:00\",\"dateModified\":\"2024-01-18T08:11:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/\"},\"wordCount\":58,\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Genie_post_war-01.jpg\",\"keywords\":[\"genie\",\"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\"],\"articleSection\":[\"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/\",\"name\":\"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Genie_post_war-01.jpg\",\"datePublished\":\"2024-01-18T07:51:19+00:00\",\"dateModified\":\"2024-01-18T08:11:28+00:00\",\"description\":\"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS) \u05d4\u05d9\u05d0 \u05e0\u05d9\u05e1\u05d9\u05d5\u05df \u05d6\u05d3\u05d5\u05e0\u05d9 \u05dc\u05e9\u05d1\u05e9 \u05d0\u05ea \u05d4\u05ea\u05e2\u05d1\u05d5\u05e8\u05d4 \u05d4\u05e8\u05d2\u05d9\u05dc\u05d4 \u05e9\u05dc \u05e9\u05e8\u05ea, \u05e9\u05d9\u05e8\u05d5\u05ea \u05d0\u05d5 \u05e8\u05e9\u05ea \u05e2\u05dc \u05d9\u05d3\u05d9 \u05d4\u05e6\u05e4\u05ea \u05d4\u05d9\u05e2\u05d3 \u05d0\u05d5 \u05d4\u05ea\u05e9\u05ea\u05d9\u05ea \u05d4\u05e1\u05d5\u05d1\u05d1\u05ea \u05d0\u05d5\u05ea\u05d5 \u05ea\u05e2\u05d1\u05d5\u05e8\u05ea \u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Genie_post_war-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Genie_post_war-01.jpg\",\"width\":2250,\"height\":2250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/cyber-security-articles\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genie.co.il\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"alternateName\":\"\u05d2'\u05d9\u05e0\u05d9\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"width\":190,\"height\":66,\"caption\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/genie.support\",\"https:\\\/\\\/x.com\\\/geniesupport\",\"https:\\\/\\\/www.instagram.com\\\/genie.computing.services\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/genie\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/computingservices\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/person\\\/1025ced5f0bbcccec1753c418a98c8be\",\"name\":\"Eyal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g\",\"caption\":\"Eyal\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"denial of service (DDoS) attack","description":"A denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a server, service, or network by flooding the target or the surrounding infrastructure with Internet traffic.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genie.co.il\/en\/ddos\/","og_locale":"en_US","og_type":"article","og_title":"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)","og_description":"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS) \u05d4\u05d9\u05d0 \u05e0\u05d9\u05e1\u05d9\u05d5\u05df \u05d6\u05d3\u05d5\u05e0\u05d9 \u05dc\u05e9\u05d1\u05e9 \u05d0\u05ea \u05d4\u05ea\u05e2\u05d1\u05d5\u05e8\u05d4 \u05d4\u05e8\u05d2\u05d9\u05dc\u05d4 \u05e9\u05dc \u05e9\u05e8\u05ea, \u05e9\u05d9\u05e8\u05d5\u05ea \u05d0\u05d5 \u05e8\u05e9\u05ea \u05e2\u05dc \u05d9\u05d3\u05d9 \u05d4\u05e6\u05e4\u05ea \u05d4\u05d9\u05e2\u05d3 \u05d0\u05d5 \u05d4\u05ea\u05e9\u05ea\u05d9\u05ea \u05d4\u05e1\u05d5\u05d1\u05d1\u05ea \u05d0\u05d5\u05ea\u05d5 \u05ea\u05e2\u05d1\u05d5\u05e8\u05ea \u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8.","og_url":"https:\/\/www.genie.co.il\/en\/ddos\/","og_site_name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","article_publisher":"https:\/\/www.facebook.com\/genie.support","article_published_time":"2024-01-18T07:51:19+00:00","article_modified_time":"2024-01-18T08:11:28+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2024\/01\/Genie_post_war-01-1024x1024.jpg","type":"image\/jpeg"}],"author":"Eyal","twitter_card":"summary_large_image","twitter_creator":"@geniesupport","twitter_site":"@geniesupport","twitter_misc":{"Written by":"Eyal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.genie.co.il\/ddos\/#article","isPartOf":{"@id":"https:\/\/www.genie.co.il\/ddos\/"},"author":{"name":"Eyal","@id":"https:\/\/www.genie.co.il\/#\/schema\/person\/1025ced5f0bbcccec1753c418a98c8be"},"headline":"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)","datePublished":"2024-01-18T07:51:19+00:00","dateModified":"2024-01-18T08:11:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.genie.co.il\/ddos\/"},"wordCount":58,"publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"image":{"@id":"https:\/\/www.genie.co.il\/ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2024\/01\/Genie_post_war-01.jpg","keywords":["genie","\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"articleSection":["\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.genie.co.il\/ddos\/","url":"https:\/\/www.genie.co.il\/ddos\/","name":"denial of service (DDoS) attack","isPartOf":{"@id":"https:\/\/www.genie.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genie.co.il\/ddos\/#primaryimage"},"image":{"@id":"https:\/\/www.genie.co.il\/ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2024\/01\/Genie_post_war-01.jpg","datePublished":"2024-01-18T07:51:19+00:00","dateModified":"2024-01-18T08:11:28+00:00","description":"A denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a server, service, or network by flooding the target or the surrounding infrastructure with Internet traffic.","breadcrumb":{"@id":"https:\/\/www.genie.co.il\/ddos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genie.co.il\/ddos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/ddos\/#primaryimage","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2024\/01\/Genie_post_war-01.jpg","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2024\/01\/Genie_post_war-01.jpg","width":2250,"height":2250},{"@type":"BreadcrumbList","@id":"https:\/\/www.genie.co.il\/ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","item":"https:\/\/www.genie.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05db\u05ea\u05d1\u05d5\u05ea \u05d1\u05e0\u05d5\u05e9\u05d0 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/cyber-security-articles\/"},{"@type":"ListItem","position":3,"name":"\u05de\u05ea\u05e7\u05e4\u05ea \u05de\u05e0\u05d9\u05e2\u05ea \u05e9\u05d9\u05e8\u05d5\u05ea (DDoS)"}]},{"@type":"WebSite","@id":"https:\/\/www.genie.co.il\/#website","url":"https:\/\/www.genie.co.il\/","name":"genie computing services for businesses","description":"","publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genie.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genie.co.il\/#organization","name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","alternateName":"\u05d2'\u05d9\u05e0\u05d9","url":"https:\/\/www.genie.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","width":190,"height":66,"caption":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},"image":{"@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/genie.support","https:\/\/x.com\/geniesupport","https:\/\/www.instagram.com\/genie.computing.services\/","https:\/\/www.linkedin.com\/company\/genie\/","https:\/\/www.youtube.com\/user\/computingservices"]},{"@type":"Person","@id":"https:\/\/www.genie.co.il\/#\/schema\/person\/1025ced5f0bbcccec1753c418a98c8be","name":"Eyal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/117776db02da3f12530b5350eed755eefd8b4ab1b6b76a3087b19419ddf8f1a2?s=96&r=g","caption":"Eyal"}}]}},"_links":{"self":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts\/19846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/comments?post=19846"}],"version-history":[{"count":0,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/posts\/19846\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media\/19847"}],"wp:attachment":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media?parent=19846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/categories?post=19846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/tags?post=19846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}