Volumetric attacks. They are carried out at levels 3 and 4 and are characterized by large-scale traffic generation. Their greatest danger is that this traffic is initially perceived as normal. Then it absorbs all the bandwidth of the target channel and creates traffic jams, blocking access for normal traffic.
Volumetric attacks include UDP flood and ICMP flood. With UDP flooding, a large bank data number of UDP packets from different fake IP addresses arrive at the target server, which processes each packet, wasting its resources.
Protocol attacks. They target limitations and weaknesses in Internet connection protocols at levels 3 and 4. In this case, the overload does not occur due to a gigantic volume of traffic. Attackers act in a targeted manner: using network imperfections, they send connection requests from just a few IP addresses and make the target service unavailable.
Such DDoS include SYN flood and RST-Fin flood. SYN attacks occur at the TCP protocol level, the server receives a heavy load due to the receipt of fake SYN packets without the necessary confirmation of the senders.
According to the impact on different layers of the OSI model, the three most common types of DDoS attacks today are
-
- Posts: 92
- Joined: Sat Dec 21, 2024 9:49 am