ddos attack meaning

DDoS Attacks in Dubai, UAE Guide

Cybersecurity threat illustration

A DDoS attack is one of the fastest ways to take a business offline, and the United Arab Emirates has become one of the most targeted countries in the region. Attacks on UAE organizations jumped from under 40,000 incidents in 2019 to over 373,000 in 2024 according to Help AG’s State of the Market Report. A single bank in the UAE was hit with a 1.8 Tbps attack in 2025. Government portals, banks, telecoms, and hospitals were hit during the coordinated campaigns of late 2025.

If you run a website, an online store, a SaaS product, or a corporate portal in the UAE, you need to understand DDoS attacks, how they work, and what actually protects you. This guide covers everything you need to know in plain language.

A Note on Transparency: AEserver is a domain registrar and hosting provider, not a DDoS protection vendor. We do not sell a standalone “DDoS Protection” service, and we will not pretend we do. For real DDoS protection, we recommend our clients use Cloudflare, which is the industry standard and offers robust DDoS mitigation even on its free plan. This guide explains how DDoS attacks actually work, what is happening specifically in the UAE, and the practical steps you can take to protect your site.

What Is a DDoS Attack?

A DDoS attack, short for Distributed Denial of Service, is a deliberate attempt to make a website, application, or network unavailable by flooding it with so much traffic that it can no longer serve real users. The goal is not to steal data or break in. The goal is to knock the target offline.

Picture a small restaurant with ten tables. A group of troublemakers sends a thousand fake reservations at once. The staff is overwhelmed, the phone lines are jammed, and real customers cannot get a seat. The kitchen is fine, the food is fine, the restaurant is simply unreachable. That is a DDoS attack in physical form.

DoS vs DDoS: The Key Difference

A DoS (Denial of Service) attack comes from a single source: one computer, one internet connection, one attacker sending traffic to one target. A DDoS (Distributed Denial of Service) attack comes from hundreds, thousands, or even millions of sources at the same time. The “distributed” part is what makes modern attacks so dangerous: you cannot just block one IP address because the traffic comes from everywhere.

How a DDoS Attack Works

Most DDoS attacks rely on what is called a botnet, a network of internet-connected devices that have been infected with malware without their owners knowing. These devices can be home computers, phones, smart cameras, routers, smart TVs, and increasingly Internet of Things (IoT) devices. When the attacker gives the command, every infected device sends traffic to the target simultaneously.

The Aisuru-Kimwolf botnet, discovered in 2025, infected between 1 and 4 million devices, mostly Android-based smart TVs. It can launch HTTP floods exceeding 20 million requests per second. That is the scale of modern DDoS firepower, and it is rented out cheaply on the dark web as “DDoS-as-a-Service.”

💡 KEY POINT: You do not need to be a major target to suffer a DDoS attack. Automated bots constantly scan the internet for any website they can knock offline, and many attacks are launched by amateurs who rent attack capacity for a few dollars per hour.

DDoS Attacks in the UAE: The Numbers

The UAE has seen a dramatic escalation in DDoS activity over the last several years. Unlike global trends where attacks grew gradually, the UAE experienced a hyperlocalized surge, with banking, government, and telecommunications taking the heaviest hits.

MetricValue
Increase in DDoS attacks in the UAE (2019 to 2024) From 38,797 to 373,429 incidents (+862%)
Longest DDoS attack duration recorded in the UAE (2024) Over 35 days
Largest DDoS attack on a UAE bank (MENA Q2 2025) 1.8 Tbps
Longest sustained campaign against a UAE bank 6 days at 380 Gbps
Percentage of MENA attacks hitting banking APIs (Q2 2025) 79%
UAE attacks in the first half of 2025 (NetScout) 3,477 incidents
Global record DDoS attack size (Cloudflare, Q4 2025) 31.4 Tbps (lasted 35 seconds)

Between October and November 2025, the UAE experienced a coordinated wave of hacktivist-driven DDoS attacks dubbed the “UAE DDoS Storm” in regional media. Government portals, banks, telecom operators, hospitals, and critical infrastructure were hit simultaneously using the same commercial DDoS-as-a-Service tools. The attacks were politically motivated, and they demonstrated that DDoS is no longer a technical nuisance, it is a geopolitical weapon.

The takeaway for UAE business owners is simple: the attack surface is expanding rapidly, attackers are increasingly sophisticated, and the cost of not preparing is no longer theoretical.

The Three Main Types of DDoS Attacks

DDoS attacks are categorized by which part of your infrastructure they target. Understanding the three main types helps you understand why a single defense is never enough.

1. Volume-Based (Volumetric) Attacks

These are the classic “floods.” The attacker’s goal is to saturate your bandwidth by sending an enormous volume of traffic from thousands of sources. Your pipe to the internet gets clogged, and no legitimate traffic can get through. Think of it as a traffic jam that extends for miles around your exit ramp.

Common volumetric attack vectors include UDP floods, ICMP floods, DNS amplification, and NTP amplification. These attacks are measured in bits per second (Bps), and the largest modern attacks now exceed 1 Tbps. Volumetric attacks are the most common type of DDoS and account for the majority of high-profile incidents.

2. Protocol Attacks

Protocol attacks exploit weaknesses in how network protocols like TCP/IP work. Instead of flooding your bandwidth, they exhaust the resources of your servers, firewalls, or load balancers by making them track many half-finished connections.

The classic example is the SYN flood. When a normal connection starts, your server receives a SYN packet, replies with a SYN-ACK, and waits for a final ACK from the client. A SYN flood sends thousands of SYN packets from spoofed addresses and never sends the final ACK, leaving your server waiting for connections that never complete. Eventually the connection table fills up and legitimate users cannot connect. Other protocol attacks include fragmented packet attacks, Ping of Death, and Smurf attacks. These are measured in packets per second (Pps).

3. Application Layer (Layer 7) Attacks

These are the stealthiest and hardest to detect. Instead of flooding bandwidth or exhausting network resources, application layer attacks target specific parts of your website or application: the login page, the checkout process, the search function, or an expensive API endpoint. Each request looks like legitimate traffic, but the sheer volume of requests crashes the web server or database behind them.

A typical HTTP flood sends millions of requests per second to a single URL that requires a database query. The client side is cheap (one HTTP request), but the server side is expensive (load page, run queries, render response). Other Layer 7 attacks include Slowloris, which ties up connections by sending requests very slowly, and GET/POST floods. These attacks are measured in requests per second (Rps).

Modern attacks often combine all three types into “multi-vector attacks” to defeat defenses that only cover one layer.

Attack TypeTargetMeasured InExamples
Volumetric (L3/L4) Bandwidth Bps (bits/sec) UDP flood, ICMP flood, DNS amplification
Protocol (L3/L4) Server and firewall resources Pps (packets/sec) SYN flood, Ping of Death, Smurf
Application (L7) Web server, database, APIs Rps (requests/sec) HTTP flood, Slowloris, API abuse

Signs Your Website Is Under a DDoS Attack

DDoS symptoms can look a lot like ordinary technical issues, which is why many attacks go undetected for the first few minutes. Here are the patterns that suggest you are under attack rather than experiencing a normal traffic surge or a server problem.

  1. Unusually slow response times, with pages taking 10 or 20 seconds to load when they normally take under a second.
  2. Intermittent unavailability, where the site works for some visitors and fails for others, or works briefly before timing out.
  3. A sudden traffic spike from suspicious sources, such as a flood of requests from a single country, a single user-agent, or a small range of IP addresses.
  4. Requests to a single URL, endpoint, or resource that vastly exceed normal traffic patterns, often targeting expensive pages like search or checkout.
  5. Unexplained surges at odd hours, or traffic that follows an unnatural pattern like identical spikes every few minutes.
  6. Your hosting provider or CDN flags unusual activity or automatically rate-limits your site.
  7. Server CPU or memory at 100% without a corresponding increase in legitimate business activity.
  8. Email or DNS services going down alongside the website, indicating that your hosting infrastructure is being saturated.
⚠️ IMPORTANT: A legitimate viral traffic spike (a popular product, a news mention, a social media hit) can look very similar to a DDoS attack. Before assuming you are under attack, check your analytics for referrers and geographic spread. Real visitors come from diverse sources with human browsing patterns. Attackers come from botnets with repetitive signatures.

How to Protect Your UAE Website: A Layered Approach

There is no single product that protects you against every type of DDoS attack. Real protection is a layered system where each layer catches what the previous one misses. Here is what we recommend for the typical UAE business website, from the basic foundation to the final safety net.

1

Start with a Quality Hosting Provider

Any reputable hosting provider, including AEserver, operates inside a data center that has baseline network-level filtering against common volumetric and protocol attacks. This is not a replacement for real DDoS protection, but it is the foundation that everything else builds on. Poor hosting infrastructure means your site goes down the moment anything unusual hits it.

Choose a hosting provider with a data center in or close to the UAE for lower latency, local compliance, and responsive support. Ask your provider whether their data center has redundant upstream connectivity and how they handle sudden traffic surges.

2

Put Cloudflare in Front of Your Website

This is the single most important step, and it is the one we consistently recommend to AEserver clients. Cloudflare is the industry standard for DDoS protection for small and medium businesses worldwide, and the free plan is sufficient for most websites.

Cloudflare works as a reverse proxy. Your visitors connect to Cloudflare’s global network first, and Cloudflare forwards only the clean, legitimate traffic to your AEserver hosting. Malicious traffic is absorbed and filtered by Cloudflare’s infrastructure, which has over 300 Tbps of total capacity, before it ever reaches your site.

What Cloudflare includes on the free plan:

  1. Unmetered DDoS mitigation at the network (Layer 3/4) and application (Layer 7) layers, with no bandwidth limits regardless of attack size.
  2. Global CDN that caches your static content at locations around the world, including Dubai, improving speed and absorbing traffic.
  3. Free SSL/TLS certificate for HTTPS, automatically managed.
  4. Basic WAF rules blocking known attack patterns and bad bots.
  5. Analytics dashboard showing traffic, threats blocked, and bandwidth saved.

Paid Cloudflare plans (Pro, Business, Enterprise) add custom WAF rules, advanced bot management, image optimization, and higher-tier DDoS protection SLAs. For most small businesses in the UAE, the free plan is genuinely sufficient.

💡 TIP: Setting up Cloudflare takes about 15 minutes. You change your domain’s nameservers at your registrar (or keep them at AEserver and use Cloudflare’s partial setup), add your DNS records, and enable the proxy. That is it. There is no software to install on your server.
3

Add Malware Scanning with SiteLock

Cloudflare filters malicious traffic, but it does not scan your website files for compromise. If an attacker finds a vulnerability in an outdated WordPress plugin and injects malicious code, Cloudflare will happily serve that compromised page to your visitors. You need a separate tool that looks inside your site.

SiteLock performs daily malware scanning, automatic removal, vulnerability detection, and OWASP Top 10 protection. Higher tiers include TrueShield, a web application firewall, and a content delivery network. SiteLock is particularly valuable for WordPress sites with many plugins, e-commerce stores handling payments, and any site that has been compromised before. It is a complement to Cloudflare, not a replacement.

4

Back Up Your Website Daily

Assume an incident will eventually happen. When it does, the difference between a 30-minute inconvenience and a 3-day disaster is a clean, recent backup stored off your main server. Acronis Backup and other Website Backup solutions automate this for you, with daily or hourly snapshots and one-click restore.

Keep at least one backup copy outside your hosting account. If an attack compromises your server, you do not want the backup to be sitting on the same infected machine.

5

Have an Incident Response Plan

When your site goes down, the clock is ticking and panic is the enemy of good decisions. Document in advance:

  1. Who to call. Your hosting provider’s support line, your developer, your Cloudflare account contact, and any cybersecurity partner.
  2. Where your credentials are stored. Registrar, hosting, CDN, and DNS, all documented in a password manager with emergency access set up for at least one trusted team member.
  3. How to communicate with customers. A pre-written holding message, a status page, a social media post template. If your site is down, you need to communicate somewhere else.
  4. How to restore from backup. The steps, the person responsible, and an estimated time to recovery.
  5. How to preserve evidence. Logs, traffic captures, and Cloudflare analytics for post-incident review or TDRA reporting if applicable.

Is Your Website Under Attack Right Now?

If you are reading this because your site is slow, unreachable, or acting strangely, and you suspect a DDoS attack is in progress, here is what to do in the next 30 minutes.

1

Confirm It Is an Attack and Not a Server Issue

Check your hosting provider’s status page first. If AEserver or your provider is reporting a datacenter-wide issue, your site is just caught in the storm. If their status is green, check your own server logs, CPU and memory usage, and incoming request patterns. A flood of requests from many IPs targeting one URL is a strong DDoS indicator.

2

Enable Cloudflare “Under Attack Mode” Immediately

If your site is already behind Cloudflare, log in, go to your domain’s Overview page, and toggle Security Level to “I’m Under Attack.” This shows a 5-second JavaScript challenge to every visitor, blocking almost all automated attack traffic. Legitimate users pass through automatically after the check. This single toggle stops the majority of L7 attacks instantly.

If your site is not yet behind Cloudflare, now is the time. Sign up for the free plan, add your domain, and update your nameservers. DNS propagation takes anywhere from a few minutes to a few hours, but traffic starts flowing through Cloudflare as soon as it propagates.

3

Contact Your Hosting Provider Support

Open a support ticket with your hosting provider describing the symptoms. Most providers, including AEserver, can apply additional filtering at the network level if the attack is hitting them directly, or advise whether the traffic is reaching your server at all.

4

Preserve Logs and Evidence

Before the incident is over, export your access logs, server logs, and Cloudflare analytics for the attack window. You will need this data for post-incident review, for your insurance provider if applicable, and for reporting to authorities. The UAE Cyber Security Council and TDRA have notification requirements for certain types of incidents.

5

Check for Compromise After the Attack Ends

DDoS attacks are sometimes used as smokescreens for other intrusions. Once your site is stable again, run a full malware scan (SiteLock or an alternative), review user accounts for unauthorized changes, check file modification dates, and rotate admin passwords. If you find signs of compromise, restore from a clean backup rather than trying to clean the live site.

⚠️ IMPORTANT: Do not pay ransom demands. Some attackers include extortion messages demanding payment to stop the attack. Paying marks you as a target for future attacks and does not guarantee the attack will stop. Report extortion attempts to UAE authorities.

UAE Legal and Compliance Context

The UAE has built a serious regulatory framework around cybersecurity, and DDoS incidents can trigger obligations under several of them.

Key UAE Cybersecurity Authorities

The UAE Cyber Security Council (CSC) coordinates the national cybersecurity strategy and publishes the State of the UAE Cybersecurity Report. The Telecommunications and Digital Government Regulatory Authority (TDRA) regulates the telecoms and digital services sector and operates aeCERT, the national computer emergency response team. The UAE National Cyber Security Strategy (NCSS) 2025 to 2031 signals a clear shift from voluntary compliance to mandatory operational resilience, especially for critical infrastructure.

Data Protection and Sovereignty

The UAE Personal Data Protection Law (PDPL) applies to any organization processing personal data of UAE residents. If a DDoS attack leads to a data breach or unauthorized access, you may have notification obligations. Our guide to the UAE Personal Data Protection Law covers the specifics.

A practical consideration that many UAE businesses overlook: if you route your traffic through a DDoS scrubbing provider whose infrastructure sits outside the UAE, your customer data technically transits through foreign jurisdictions during mitigation. For most commercial sites this is acceptable, but for government contractors, regulated financial services, and healthcare providers, data sovereignty contracts and local Points of Presence (PoPs) matter. Cloudflare operates a PoP in Dubai, which helps.

Is Launching a DDoS Attack Illegal in the UAE?

Yes. Under the UAE Federal Decree-Law No. 34 of 2021 on Combating Rumors and Cybercrimes, intentionally disrupting an information system, network, or website carries significant penalties including imprisonment and large fines. Hiring a DDoS-as-a-Service tool to attack someone else is also a criminal offense, even if the actual infrastructure sits outside the UAE.

10 Common DDoS Mistakes UAE Businesses Make

  1. Believing you are too small to be a target. Automated bots do not care about your revenue. They scan every IP address in the UAE and attack whatever is unprotected.
  2. Relying only on your hosting provider’s “built-in DDoS protection.” Most shared hosting baseline protection covers basic volumetric attacks only and will not stop a modern L7 assault.
  3. Not using Cloudflare or an equivalent CDN. The free plan takes 15 minutes to set up and blocks 90% of what targets typical business websites.
  4. Running outdated CMS, plugins, and themes. Many attacks combine a DDoS flood with exploitation of known vulnerabilities. Patching is prevention.
  5. Using weak admin passwords and no multi-factor authentication. DDoS often masks credential stuffing attempts running in parallel.
  6. Storing backups only on the same server. If the attack leads to compromise, your backup is compromised too.
  7. Having no incident response plan. When the site goes down, the team scrambles, decisions are made in panic, and recovery takes three times longer than it should.
  8. Ignoring monitoring and alerts. By the time customers complain, the attack has been going for 30 minutes. Set up automated uptime monitoring that alerts you within minutes.
  9. Paying ransom demands. It funds the attackers, marks you as a payer, and does not stop the attack reliably.
  10. Not reporting incidents. Reporting to aeCERT and keeping evidence helps build UAE-wide threat intelligence, and may be legally required depending on your sector.

Frequently Asked Questions

What is a DDoS attack in simple terms?

A DDoS attack is when many computers, often thousands, send traffic to a website at the same time, with the goal of overwhelming it so that real visitors cannot get through. The website does not get hacked, it just gets too busy to respond to anyone.

Does AEserver provide DDoS protection?

Not as a standalone service. All AEserver hosting plans run inside data centers with baseline network-level filtering against common volumetric attacks, which is standard for any serious hosting provider. For real DDoS protection, including against application-layer attacks and sophisticated bot traffic, we recommend our clients put Cloudflare in front of their site. The free plan covers most small and medium businesses in the UAE.

Is Cloudflare’s free plan enough to protect my business from DDoS?

For most small and medium websites in the UAE, yes. Cloudflare’s free plan includes unmetered DDoS mitigation at layers 3 to 7, a global CDN, free SSL, and basic WAF rules. You should consider paid plans (Pro, Business, or Enterprise) if you need custom WAF rules, advanced bot management, image optimization, or if you have compliance requirements that demand always-on mitigation SLAs. Banks, government entities, and critical infrastructure operators should evaluate enterprise-grade solutions with local scrubbing centers and dedicated support.

How long do DDoS attacks typically last?

Most DDoS attacks are short, lasting from a few minutes to an hour. Attackers often use brief attacks to avoid automatic mitigation kicking in. However, sustained campaigns do happen. Help AG recorded a single DDoS attack against a UAE target that lasted more than 35 days in 2024, and StormWall recorded a 6-day campaign against a UAE bank at 380 Gbps average in Q2 2025. The longer the attack, the more expensive it is for the attacker, so extended campaigns usually indicate a motivated, well-resourced adversary.

Can a firewall alone stop a DDoS attack?

No, not a traditional network firewall. Firewalls inspect traffic one packet at a time and can be overwhelmed by the volume of a DDoS attack, becoming part of the problem rather than the solution. You need specialized DDoS mitigation infrastructure (like Cloudflare’s anycast network) that can absorb attack traffic at a scale no single firewall can handle. A Web Application Firewall (WAF) is useful specifically against Layer 7 attacks, and modern services like Cloudflare include WAF alongside network-layer DDoS mitigation.

What is the difference between DoS and DDoS?

A DoS attack comes from a single source, one computer sending traffic to one target. A DDoS attack comes from many sources simultaneously, usually a botnet of thousands or millions of infected devices. DDoS attacks are far harder to defend against because you cannot simply block one IP address: the traffic is coming from everywhere.

How do I know if my website is being DDoSed and not just having a busy day?

Legitimate traffic spikes come from diverse sources with realistic browsing patterns: different countries, different user-agents, varied referrer sources, and human-like behavior on your site. DDoS traffic typically shows repetitive signatures: the same user-agent, requests concentrated on one or two URLs, geographic clustering in unusual regions, and no progression through your site (no product views leading to checkout, for example). Your Cloudflare or hosting analytics dashboard will usually show this pattern clearly.

How much does DDoS protection cost for a small business in the UAE?

For most small businesses, the practical answer is zero dirhams per month, because Cloudflare’s free plan provides meaningful DDoS protection at no cost. Cloudflare’s paid plans start at around USD 20 per month (Pro) and USD 200 per month (Business) for more advanced features. Enterprise-grade solutions from vendors like Radware, NETSCOUT, or StormWall, typically sold through UAE partners like Help AG or Liberty Security Systems, start in the thousands of dirhams per month and are targeted at banks, government, and critical infrastructure.

Does using a VPN protect my website from DDoS attacks?

No. A VPN protects your personal internet traffic as a user. It does nothing for a website that you operate. If anything, hosting your site behind a consumer VPN would make things worse by adding latency and a single point of failure. You need server-side DDoS mitigation, which is what Cloudflare and similar services provide.

Should I report a DDoS attack to UAE authorities?

For critical sectors (banking, government, telecom, healthcare, energy), yes, and in some cases it is required. For general businesses, reporting to aeCERT (operated by TDRA) helps build national threat intelligence and may be useful if the attack is linked to a broader campaign. If the attack involves extortion, identity theft, or other cybercrime elements, report to UAE police through the eCrime platform at ecrime.ae.

Key Takeaways

  1. DDoS attacks in the UAE are growing rapidly, up more than 860% between 2019 and 2024 according to Help AG, and attacks on critical infrastructure are increasingly politically motivated.
  2. Three main types exist: volumetric (bandwidth floods), protocol (server resource exhaustion), and application-layer (targeted attacks on specific site functions). Modern attacks combine all three.
  3. AEserver does not sell DDoS protection as a standalone service. We recommend our clients use Cloudflare, which is the industry standard and offers strong protection on its free plan.
  4. Protection is layered, not singular. Quality hosting + Cloudflare + malware scanning (SiteLock) + daily backups + an incident response plan is the practical five-layer approach.
  5. If you are under attack right now, enable Cloudflare’s “Under Attack Mode,” contact your hosting support, preserve logs, and do not pay ransom demands.
  6. UAE regulations matter. The CSC, TDRA, PDPL, and the NCSS 2025 to 2031 create a framework where cybersecurity resilience is becoming mandatory, not optional.
  7. Backups and monitoring are your insurance policy. Assume an incident will happen, and prepare so that recovery is measured in minutes, not days.
×
Rohit S.

Rohit S.

Partner Manager at AEserver and an expert in national domains (ccTLDs), as well as in protecting brands and intellectual property on the Internet. Specializes in domain portfolio management, digital positioning and legal protection through domain zones. Has been certified by Google in the basics of digital marketing. LinkedIn

.ae Price
.bh Price
icon-qa
Google_Cloud_Partner_UAE
icon-microsoft
cpanel uae partner logo
icon-ripe-ncc.svg
⚡ Build your website in 60 seconds with AI + WordPress — now 50% off
This is default text for notification bar