1. Why Availability Attacks Exist
Disrupting availability is cheaper and faster than breaching systems. Extortion, distraction during another attack, retaliation, political signaling, competitive disruption — the motivations vary but the mechanism is consistent: make the service unreachable or unusable long enough to cause real harm.
The attack layer matters for the response. Bandwidth saturation at the edge requires different mitigation than a SYN flood exhausting connection tables, which is different again from a targeted request flood against an expensive API endpoint. Defenders who apply the wrong mitigation to the wrong layer slow themselves down.
Many organizations have scrubbing relationships and CDN protections, but still experience prolonged outages during attacks because recognition is slow, escalation paths aren't practiced, and runbooks assume conditions that don't match reality under pressure.