DDoS (distributed denial-of-service) attacks have been wreaking havoc on organizations since the mid-1990s. Their objective seems simple: to deluge a computer network with a slew of traffic packets it cannot cope with.
However, the DDoS ecosystem is heterogeneous and spans dozens of different techniques. Furthermore, malicious actors’ motivations range from political protest to financial schemes. The latter approach is exemplified by ransom DDoS, where criminals knock an enterprise network offline and demand payment to stop the attack.
Based on the targeted network components and the mechanisms used, DDoS attacks can be split into three top-level categories:
However, the DDoS ecosystem is heterogeneous and spans dozens of different techniques. Furthermore, malicious actors’ motivations range from political protest to financial schemes. The latter approach is exemplified by ransom DDoS, where criminals knock an enterprise network offline and demand payment to stop the attack.
Based on the targeted network components and the mechanisms used, DDoS attacks can be split into three top-level categories:
- Volumetric attacks aim to overwhelm a network’s bandwidth with more traffic packets than it can process
- Protocol attacks try to deplete all the resources of a web server or a firewall
- Application-layer attacks cash in on disrupting the normal functioning of web applications rather than an entire IT network
- SYN flood
- LAND attack
- SYN-ACK flood
- ACK and PUSH ACK flood
- Fragmented ACK flood
- Spoofed session flood
- UDP flood
- VoIP flood
- Media data flood
- DNS flood
- NTP flood/amplification
- CHARGEN flood
- SSDP flood/amplification
- SNMP flood/amplification
- HTTP flood
- Single session HTTP flood
- Recursive HTTP GET flood
- Random recursive GET flood
- ICMP flood
- Misused application attack
- IP null attack
- Smurf attack
- Fraggle attack
- Ping of death attack
- Slowloris
- LOIC (Low Orbit Ion Cannon)
- HOIC (High Orbit Ion Cannon)
- Advanced persistent DoS
- ReDoS
- Zero-day DDoS