05-12-2020 , 01:42 AM
Quote:A big hurdle to thwarting the DDoS phenomenon is that it’s heterogeneous and spans a variety of different tactics. To begin with, there are three overarching categories of these attacks that form the backbone of this ecosystem:
- Volume-based (volumetric) attacks are the “classic” ones that congest a target network’s bandwidth with a hefty amount of traffic packets.
- Protocol attacks are aimed at exhausting server or firewall resources.
- Application layer (layer 7 DDoS) attacks zero in on specific web applications rather than the whole network. These ones are particularly hard to prevent and mitigate while being relatively easy to orchestrate.
Are you Ready for These 26 Different Types of DDoS Attacks?
1. SYN Flood
2. LAND attack
3. SYN-ACK Flood
4. ACK & PUSH ACK Flood
5. Fragmented ACK Flood
6. Spoofed Session Flood (Fake Session Attack)
7. UDP Flood
8. DNS Flood
9. VoIP Flood
10. NTP Flood (NTP Amplification)
11. CHARGEN Flood
12. SSDP Flood
13. SNMP Flood (SNMP Amplification)
14. HTTP Flood
15. Recursive HTTP GET Flood
16. ICMP Flood
17. Misused Application Attack
18. IP Null Attack
19. Smurf Attack
20. Fraggle Attack
21. Ping of Death Attack
22. Slowloris
23. Low Orbit Ion Cannon (LOIC)
24. High Orbit Ion Cannon (HOIC)
25. ReDoS
26. Zero-Day DDoS
Read more Here