DDoS Attack Types

What is DDoS Attack ?

A DDoS attack is a malicious application designed to prevent users from making an online service available by temporarily interrupting or suspending their hosting server service. 
It is launched from a botnet, which is a global network of compromised devices. In contrast to DoS attacks, it overwhelms a target using only one Internet-connected device. Because of this specificity, there are two slightly different definitions.

Common DDoS Attack Types

HTTP Flooding

An individual web server or application is targeted by a hacker using HTTP GET or POST requests to gain access. These are a type of layer seven attacks that take advantage of legitimate packets to infiltrate a network. 
Attackers use this method to take down the victim’s network because it consumes less bandwidth than other methods of network disabling.

UDP Flooding

A UDP flood is defined as any distributed denial of service violence that overwhelms a target system with UDP packets. The purpose of this attack is to overflow random ports on a remote host with traffic. 
The outcome is that the host will continually check for it and respond with an ICMP ‘Destination Unattainable’ packet if no such application is found. As soon as this process is completed, the host’s resources are finite, and the server becomes unavailable to users.

Flood ICMP (Ping)

This attack, like a UDP flood attack, involves flooding the target resource with ICMP (ping) packets until the resource is overloaded. They priorities sending packets without waiting for responses. 
Since the victims’ systems regularly try to respond with ICMP packets. This attack type can consume large quantities of both extroverted and incoming bandwidth as the entire system is significantly decreased.

Malicious workers

Customers’ lists and intellectual property (IP) can be extracted by malicious or disgruntled employees using their security clearances, either requesting a ransom or selling it for unfair purposes to others.

Ping of Death

They allow delivering a series of malicious or defective pings into the system by the attacker. The IP packet size length is 65.535 bytes. On an Ethernet network, the network layer typically restricts the maximum frame size to 1500 bytes, which is the industry standard. 
A huge IP packet is divided into several IP packets (s), and in the entire packet, the receiver host reconstructs the IP fragments. 
When reconstructed as a side effect of malicious manipulation in the death ping case, the recipient receives an IP packet greater than 65,535 bytes. This has the potential to cause the packet memory buffers to overflow, preventing genuine packets from receiving service.

Flood, SYN

In this DDoS attack, a well-known TCP connection sequence flaw is utilized, in which an SYN application must first receive a response from the target host, followed by an ACK response from the client, to establish a TCP connection with the target host. 
The applicant sends several SYN applications but does not answer the host’s SYN-ACK reactions or deliver SYN requests from an IP-spoofed address in a Flooding attack situation. 
In each case, the host system is still waiting to recognize each application and ties up the means until no new links can be established, which will eventually result in denial

Amplification of NTP

The perpetrator of an NTP amplification attack is flooding a target server with UDP traffic on publicly open Network Time Protocol servers. Due to the extreme query-to-response ratios in these contexts. When the ratio exceeds 1:200, the attack is classified as an amplification attack. 
This means that any hacker who obtains several available can easily launch a damaging, high-bandwidth, increased DDoS attack using Metasploit or data from the Open NTP Project


This attack allows the webserver without interfering with any other target network services or connectors to be downloaded from another server. This is done through the maintenance of as many web server connections as possible. This can only be done when the target system is connected, but only part of the query has been sent. 
Slowloris deliver additional HTTP headers, but your request not ever complies. The targeted network keeps every false connection open. The extreme consequent linking pool overflows, and legitimate users don’t want additional connections. 
Furthermore, there are a plethora of DDoS attack sub-types and have their own set of characteristics.

How do hackers use attack vectors?

Hackers are well-versed in common security vectors. They first look for vulnerabilities to hack one of these security vectors. 
A software or operating system flaw (OS). A security flaw can be caused by a software bug or a security configuration flaw. They are breaking or stealing an employee’s security credentials. 
Hackers constantly scan systems, applications, and networks for flaws. It makes it possible to target physical locations or vulnerable users and internal staff willing to share IT access credentials.

Difference between an attack vector and an attack surface

Using an attack vector, cybersecurity attacks are launched. This could involve malware or a phishing attack to steal account information and unlicensed access to company data or resources. Digital networking is a different way of starting an attack. The attack surface is the general network area an attacker can use to start attack vectors, extract data, or access an organization’s systems. Because an attacker can exploit their vulnerabilities, like weak passwords or unpatched software, devices and personnel are part of an organization’s attack surface.

Protect devices from common vector attacks

Cyber hackers use various methods to gain access to corporate IT assets. ITs work involves identifying and implementing policies, tools, and techniques that best protect them from such attacks. Here is a list of effective protection methods:

  • Users should be trained.
  • Create and adhere to effective password policies
  • Install software that will monitor and report on security incidents.
  • IT resources should be audited and tested regularly for vulnerabilities.
  • Keep information technology security at the forefront of your mind.
  • Collaborate with the human resources department (HR).
  • Install all updates as soon as possible.
  • Thin clients should be used in organizations that have a bring your device (BYOD) policy.
  • When using portable devices, use strong data encryption.
  • Examine and configure all of your security settings.
  • Physical spaces should be kept safe.