SSH is a secure protocol for connections over unsecured networks. Without proper security, SSH is vulnerable to DDoS attacks from multiple compromised systems flooding the server with requests. To prevent DDoS attacks, system administrators can change the SSH port, only allow trusted networks with knock authentication, avoid configuration weaknesses like SSH-2 protocol and no root login, and implement additional security tips like preferring keys over passwords, limiting password logins, continuous monitoring and logging.