Skip to main content

      Distributed denial-of-service (DDoS) attacks were long regarded as a relatively one-dimensional threat. High traffic volumes, overloaded lines, unreachable services. Anyone who purchased sufficient bandwidth, scaled up their load balancers or activated scrubbing services believed they were well prepared. But this view is now outdated.

      DDoS in 2026 is rarely an end in itself. The real danger often lies less in short-term unavailability than in what happens unnoticed in the meantime.

      The shift in the threat model

      Modern attacks increasingly focus on complexity rather than volume. Instead of monolithic, high-volume attacks, security teams now observe adaptive, multi-stage patterns. Short bursts of traffic alternate with periods of apparent normality. Requests appear legitimate, use valid protocols and mimic real user behaviour.

      Layer 7 attacks are particularly common, specifically targeting application logic, Application Programming Interfaces (APIs) or authentication flows. These attacks generate hardly any traditional network stress, but tie up resources precisely where business logic is processed. The result is not a widespread outage, but a creeping degradation – difficult to measure, difficult to pinpoint, difficult to prioritise.

      DDoS as a tactical diversion

      In many of the incidents investigated, DDoS attacks now serve as a smokescreen. Whilst incident response teams are preoccupied with availability, escalation procedures and status updates, other activities are taking place in parallel: credential stuffing, API enumeration, testing authorisation limits, or establishing persistent access.

      This simultaneity is often no coincidence. DDoS attacks capture attention, fragment responsibilities and create operational pressure. Traditional divisions between network, application and security teams exacerbate this effect. Individual units respond correctly within their own silos, but the campaign as a whole often goes unmonitored.

      Why traditional defence falls short

      Many organisations still manage DDoS mitigation in isolation. Thresholds trigger scrubbing, firewalls throttle connections, and operations teams monitor availability. These measures work – for their respective purposes.

      What is missing is context. A sudden spike in traffic could be marketing traffic, a release effect, or indeed the start of a targeted wave of attacks. Only when volume, sequences, identity characteristics and application logic are considered together does a valid picture of the situation emerge. Without this connection, relevant signals remain unclear or are interpreted differently.

      Availability as a security discipline

      DDoS attacks are a prime example of how availability is no longer merely an operational metric. It is an integral part of the security architecture. Services must not only remain accessible, but also monitorable.

      Modern approaches therefore integrate DDoS defence more closely with web, API and bot protection. Shared telemetry enables load patterns to be correlated, behavioural anomalies to be detected and responses to be tailored – blocking, throttling, challenging. What matters here is not the maximum severity of the measure, but its precision.

      Implications for organisation and governance

      With regulatory requirements such as NIS 2, the Digital Operational Resilience Act (DORA) or sector-specific reporting obligations, this development is becoming increasingly relevant. Availability must be reported. Responses must be traceable and decisions must be verifiable.

      A DDoS incident without a clear classification raises questions: Why was scaling used rather than filtering? Why was the attack initially overlooked? Why were parallel anomalies not detected? Without consistent observability, these questions remain unanswered, both technically and organisationally.

      How organisations can respond to this development

      If DDoS attacks can no longer be viewed as isolated incidents affecting availability, countermeasures must also be realigned. It is crucial to move away from purely volume-based defences towards a context-based protection approach. Load, request behaviour, identity characteristics and application logic must be evaluated together in order to distinguish between legitimate usage peaks and targeted attack patterns. Only this correlation enables selective responses that protect availability without giving attackers any room for manoeuvre.

      Technically, this means closer integration of DDoS defence with web, API and bot protection, so that telemetry is not fragmented but instead provides a consistent situational picture. The organisational dimension is at least as important. DDoS incidents now involve several teams simultaneously and generate significant operational pressure. Clear responsibilities, coordinated escalation paths and a shared understanding of when availability becomes a security issue are therefore crucial.

      Preparation is the third factor. Exercises should not test DDoS in isolation, but rather consider it as part of coordinated attack scenarios. Observability, practice and governance thus become the actual protective factors.

      Conclusion: DDoS is not a problem of overload, but one of orchestration

      By 2026, DDoS will no longer be merely an overload problem. It will be an orchestration problem. Attacks will become quieter, shorter and more context-sensitive. The real challenge lies not in fending off individual waves, but in recognising the pattern behind them.

      Organisations that consider availability, identity and application logic together reduce blind spots and gain decision-making time – often the decisive factor. Those who continue to treat DDoS in isolation are defending correctly, but against the wrong aspect of the attack.

      Your contact

      Marvin Kroschel

      Manager, Consulting - Cyber Security

      KPMG AG Wirtschaftsprüfungsgesellschaft