Types of DOS/DDOS Attacks
1) volume-based attacks.
2) Protocol Attacks.
3) Application layer Attacks.
4) UDP Flood.
5) ICMP (Ping) Flood.
6) SYN Flood.
7) Ping of Death.
8) Slowloris.
9) NTP Amplification.
10) HTTP Flood.
11) Application Layer Attack.
* 1) volume-based Attacks.
Includes UDP floods, ICMP floods, and many other spoofed floods. The reason for the Attack is to contaminate the processing power of the attack site, and the magnitude is measured in bits per second.
* 2) Protocol Attacks.
Here Involves SYN floods, fragmented packet attacks, Death Ping, Smurf D Dos, and more. This sort of attack consumes actual server resources or optimal communication devices, like firewalls and load adjusting devices, and is measured in packets per second.
* 3) Application Layer Attack.
Includes small-and-slow attacks, GET / POST floods, attacks targeting Apache, Windows or OpenBSD weaknesses, and more. the target of those attacks, consisting of seemingly legitimate and innocent demands, is to crash the server, and therefore the size is measured in Requests per second.
* 4) UDP Floods.
By definition, a UDP flood is any D Dos attack that floods a target with User Datagram Protocol packets. The Attack’s goal is to flood random ports to a foreign host. Those causes the host to look repeatedly for the appliance listening at that interface, and answer with the packet ICMP Destination Unreachable. This phase saps host resources, which can ultimately end inaccessibility.
* 5) ICMP PING Flood.
In terms analogous to the UDP flood attempt, the intended resource is flooded by an ICMP flood of ICMP Echo Query (ping) packets, usually submitting packets as soon as possible without expecting responses. This method of assault will be using both inbound and outbound bandwidth since the victim’s servers would always seek to reply with ICMP Echo Response packets leading to an overall severe delay within the network.
* 6) SYN Flood.
An SYN flood D Dos attack exploits a recognized flaw within the TCP link series whereby an SYN request to determine a TCP link with a number must be replied to by an SYN-ACK reply from that host, then verified by an ACK answer from the requester. The requester sent several SYN requests in an SYN flood situation, but either doesn’t answer the SYN-ACK response from the server or sent SYN requests from a spoofed IP address. Each way, with any of the queries, the host network proceeds to attend with acceptance, binding services before no further links are often created and eventually end in DOS.
* 7) Ping of Death.
A death ping death requires the intruder to transmit multiple malformed or harmful pings to a system. An IP packet’s total packet duration (including header) is 65,535 bytes. The info Connection System, though, typically presents limitations to the typical frame size–1500 bytes on an Ethernet network, for instance. During this scenario, a broad IP package is going to be broken into several IP packages. Therefore the receiver host must reassemble the IP fragments into the entire packet. During a Ping of Death situation, the receiver finishes up with an IP packet that’s greater than 65,535 bytes when reassembled after fraudulent abuse of the fragment material. This may delegate storage buffers leak.
* 8) Slowloris.
Slowloris maybe a focused assault that permits one server to access another site without disrupting the target channel’s other resources or connection. Slowloris achieves so by maintaining as many be numerous links as possible available to the goal Web server. It does so by building links to the aim server and only by submitting a partial message. Slowloris delivers further HTTP headers all the time but never finishes a file. The target server holds open all of those fake links. It inevitably fizzes the allowable cumulative contact volume, which contributes to rejection by legal clients of additional connections.
* 9) NTP Amplification.
The attacker targets publicly-accessible Network Time Protocol servers in NTP amplification attacks to flood a specified device with UDP traffic. The attacker is understood as an amplification invasion, and in these situations, the stored procedure-to-response ratio remains between 1:20 and 1:200 or more. It ensures that each intruder accessing an inventory of available NTP servers will quickly produce a destructive heavy-bandwidth, heavy-volume D DoS assault.
* 10) HTTP Flood.
The intruder uses apparently-legitimate HTTP GET or POST requests to assault — a server or device during a D Dos assault via HTTP surge. HTTP floods don’t use malformed packets, spoofing or reflective tactics and needless bandwidth to scale back the target site or website than other assaults.
The assault is most successful because it causes the server or the client to assign the foremost available resources in answer to every question.
* 11) Application Layer Attacks.
Application layer attacks or layer 7 D DoS attacks ask for a sort of malicious activity intended to hit the “core” layer within the Open System interconnection model (OSI) where specific network requests like HTTP GET and HTTP POST occur. In comparison to network layer attacks like DNS Modulation, these layer 7 attacks are particularly useful thanks to their server resource usage, additionally to network resources.