Introduction

DDoS (Distributed Denial of Service) attacks are malicious attempts to disrupt online services by overwhelming them with excessive traffic. These attacks come in several different forms, each targeting specific vulnerabilities in a system. Knowing the different types of DDoS attacks is crucial for developing effective defense strategies.

1. Volume-Based Attacks

UDP Flood

A UDP flood sends large numbers of UDP packets to random ports on a target server. The server checks for an application listening at that port and replies with an ICMP “Destination Unreachable” packet, overloading its resources.

ICMP Flood (Ping Flood)

The attacker sends massive ICMP Echo Request (ping) packets to the victim, consuming bandwidth and processing power.

TCP Flood

Floods a target with TCP connection requests (SYN packets), consuming server resources and potentially causing downtime.

Goal: Consume all available bandwidth.

2. Protocol Attacks

SYN Flood

Sends repeated SYN requests to a server, never completing the handshake. The server keeps half-open connections alive, exhausting its resources.

Ping of Death

Sends malformed or oversized packets that can crash or freeze systems when reassembled.

Smurf Attack

Sends ICMP requests to a network’s broadcast address using a spoofed IP (the victim’s), causing all devices to respond to the victim.

Goal: Exploit weaknesses in Layer 3 and 4 protocols.

3. Application Layer Attacks

HTTP Flood

Mimics real users by sending numerous HTTP requests to overwhelm a server.

Slowloris

Opens connections and sends partial HTTP requests slowly, keeping them open and exhausting server resources.

DNS Query Flood

Bombards a DNS server with excessive requests, affecting name resolution and slowing responses.

Goal: Exhaust server resources at the application layer (Layer 7).

Conclusion

Each type of DDoS attack targets different components of a network or application. From bandwidth floods to application-level exploits, understanding these threats is key to defending against them. Implementing layered security, traffic monitoring, and DDoS protection services is essential.

Share this article: