During December 2018 and January 2019, there have been two online protests against the governments of Sudan and Zimbabwe. In both protests, the hacktivism group, Anonymous, used what is known as a Distributed Denial-of-Service (DDoS) attack to disable government related websites in both Afrikan countries.
Speaking to iAfrikan, one of the people involved in carrying out the DDoS attacks for Anonymous, Lorian Syrano, explained that they used DDoS as a form of protest.
“The DDoS attacks aims to shut down the targeted website or server as a form of protest.”
Given the attention the attacks received from accross the continent and the world, it seems there is a misunderstanding of what a DDoS attack is and whether it is permanent or not. This article aims to clarify that.
What is a protest?
A protest,simply put, can be broken down into two parts:
- Disagreeing with something.
- Bringing attention to the grievance/disagreement.
Using the #FeesMustFall student protests that took place in South Africa, they displayed both simplified characteristics of our definition of a protest. Firstly, the students disagreed with South Africa’s government and universities that they should be required to pay for education. Secondly, through mass protests, they brought attention to their grievance.
This is no different to what DDoS achieves via the Internet when used as a form of protest.
Simply put, DDoS attack is an attempt to disrupt normal traffic of a targeted server, service, or network, by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. This is in a similar way that a mass protest in real-life would disrupt access to key roads and buildings in order to disrupt their operations and bring attention to a specific grievance.
DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems (bots) as their sources of generating Internet traffic to attack targeted systems. These compromsed compromised computer systems can include computers and other networked resources such as IoT devices.
To use another another analogy, a DDoS attack is like a traffic jam clogging up with highway, preventing regular traffic from arriving at its desired destination.
DDoS attack is like an interruption of traffic. Cloudflare
It is understandable that DDoS is mainly frowned upon by some ICT professionals as it has, in many cases, been used for more malicious purposes than just as a form of protest. However, as Anonymous and other protest groups have illustrated, it can be a useful, albeit temporary, form of online protest too.
Cover image credit: A group of students raise their hands in the air to signal that they have come in peace. Myolisi/Wikimedia Commons