SlideShare a Scribd company logo
E N T E R P R I S E I T
S E C U R I T Y
WEB APPLICATION FIREWALL & DDOS
MITIGATION SOLUTION
12 TYPES OF DDOS ATTACK
www.haltdos.com
What is a
DDoS attack?
DDoS (Distributed Denial of Service) attack is a type of a cyber-
attack where an attacker use multiple compromised systems to
flood a network/web application with illegitimate traffic and
make it unavailable for the legitimate users who are trying to
access it.
During a DDoS attack, the incoming traffic which is
responsible for flooding the victim is originated
from many different sources. This efficiently
makes it impossible to stop the attack simply by
blocking a single IP address and thus, it is very
difficult to distinguish between legitimate user
traffic and attack traffic when it is spread across
too many points of origin which causes a denial of
service.
How DDoS
Attacks Work?
In today’s online businesses, DDoS attacks hold for a major concern. 
According to the report presented by Akamai - Q3 2017 Security Report, it was
concluded that there’s a 179.66% increase in the total number of DDoS
attacks since the last 3 years. 
Overview
Businesses from all over the world have suffered numerous high profile cyber incidents over the
past few years; with attacks on Github on Feb 2018 and several attacks on ISPs and Banks all over
the world showed us that even a single DDoS attack can have the potential to bring down any
business to its knees.
DDoS attacks have grown greater and urbane over the years, whether be it flooding a target with a
simple ping command based ICMP echo request or complex multi-vector attacks. In this
document, we shall overview the different types of DDoS attacks.
1. Application Level Attacks 
Application level attacks occur when an attacker attacks a specific application
or a website that is poorly coded in order to exploit its weakness. As a result,
the entire server gets exhausted and becomes unavailable to the legitimate
requests. Websites and applications with security loopholes also fall under the
susceptibility for hackers intending to steal information. These loopholes can
also be exploited with the help of a simple targeted attack that targets the
database. For example WordPress and Joomla are applications that can
exhaust a server’s resources.
2. Zero Day (0day) DDoS
Zero Day DDoS attacks are the attacks that are unidentified yet they exploit
new vulnerabilities. These attacks are not traceable and have undefined
defensive mechanisms.  
3. Ping Flood
Ping Flood is an application specific type of DDoS attack that is an evolved
version of Internet Control Message Protocol (ICMP) flood. In this type of DDoS
attack the attacker sends multiple spoofed ping packets to the server through
a large set of source IP. The purpose of the attacker is to flood the target with
ping packets until it goes offline.
It is designed in such a way that it consumes all the resources and bandwidth
which are available in the network until it is completely exhausted and finally
shuts down. It is not very easily detectable as it closely resembles the
legitimate traffic.
4. IP Null Attack
The IP packets contain IPv4 headers that enclose all the information about the
transport protocol which is being used in the protocol field.  In IP Null attack,
the attacker sends packets containing null value (zero) in this field and these
packets can neglect security measures which are designed to scan TCP, IP and
ICMP. As a result, when the server which is targeted will try to process these
packets, it will exhaust its resources and will reboot.
5. NTP Flood
NTP is an abbreviation used for Network Time Protocol. It is basically an
internet protocol which is used to synchronize the clocks of computers to
some time-reference. NTP Flood attack occurs when an attacker sends small
packets containing a spoofed IP of the target to internet enabled devices
running NTP. These spoofed requests then sends UDP floods as responses
from these devices to the target. When the target tries to identify this flood of
requests, all its resources gets exhausted and either it goes offline or will
reboot.
6. ICMP Flood
In an Internet Control Message Protocol (ICMP) Flood Attack occurs when an
attacker sends highly-spoofed ICMP packets in huge amount to flood a
network. As a result, all the resources and available bandwidth are consumed
and the network gets exhausted and it goes offline. ICMP floods can
overpower a network with packets containing random or fixed source IP
addresses. This attack can be viewed as a Network-Level volumetric attack
and thus can be defeated by L3/L4 Packet Filtering. 
7. SYN Flood
SYN flood attack occurs when an attacker sends a succession of SYN requests
to a targeted system. All the server resources are consumed and the system
thus becomes unresponsive to legitimate traffic. By flooding multiple TCP
ports on the target system with SYN (synchronize) messages, a SYN-flood
DDoS attack takes advantage of the TCP (Transmission Control Protocol) three-
way handshake process in order to initiate a connection between the source
system and the target system, thus making the system unresponsive to
legitimate traffic.
8. UDP Flood Attack
UDP stands for User Datagram Protocol that sends short packets of data,
called datagrams. UDP flood attack occurs when the attacker tries to flood the
target server with large number of spoofed data packets. As a result, all the
available bandwidth is consumed and exhausted. Thus, IP server gets down.
It is harder for defensive mechanisms to identify a UDP Flood attack since it is
an end to end process of communication between client and host.
9. UDP Fragmented Floods
The activity generated by the UDP fragmented flood attacks is similar to the
UDP flood attack, with a difference that in this case the attacker sends the
fragmented data packets to the target server. The target server then tries to
put these unrelated and fake fragmented UDP data packets together and
eventually fails to do so. As a result, all the available resources get exhausted
and this may lead to server reboot.
10. DNS Flood Attack
DNS Flood Attack occurs when the attacker sends a large amount of spoofed
DNS requests that are exact replica of the real DNS requests from a very large
set of source IP. Hence, it is not possible for the target server to differentiate
between the real and the fake DNS requests. In order to serve all the requests,
the server exhausts all its resources. As a result, the attack consumes all the
available bandwidth until it is completely drained out.
11. SIP Flood Attack 
Session Initiation Protocol (SIP) is a commonly used signaling protocol which is
used to support voice communication, video communication and other
multimedia applications. SIP Flood Attack occurs when an attacker sends
multiple INVITE requests without waiting for responses from the UAS or the
proxy with an aim to exhaust their respective resources.
12. Slowloris Attack
In this type of attack first of all the TCP connection is established, then as the
multiple requests comes at regular intervals, all the connections are eventually
consumed that restrict other servers to connect until some of the connections
are released. Thus at this point of time, hackers with limited traffic resources
successfully mount a Slowloris attack.
info@haltdos.com
To learn more visit our website - www.haltdos.com
FREE TRIAL
S T A R T Y O U R
https://app.haltdos.com
W E B A P P L I C A T I O N
F I R E W A L L & D D O S
P R O T E C T I O N
Understand the current web application threat
landscape, know why traditional network security
solutions fail to provide a complete protection against
today’s emerging threats and why your organization
needs a web application firewall to mitigate IT risks.
Sign up at haltdos.com

More Related Content

What's hot

Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Kaustubh Padwad
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Ahmed Ghazey
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
stollen_fusion
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
Rollingsherman
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
Anil Antony
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
Dhrumil Panchal
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
Amazon Web Services
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
Marcelo Silva
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
kalyan kumar
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
Vishwanath Badiger
 
Botnets
BotnetsBotnets
Botnets
Kavisha Miyan
 
Botnets
BotnetsBotnets
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 

What's hot (20)

Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
An introduction to denial of service attacks
An introduction to denial of service attacksAn introduction to denial of service attacks
An introduction to denial of service attacks
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Dos attack
Dos attackDos attack
Dos attack
 
DoS Attack - Incident Handling
DoS Attack - Incident HandlingDoS Attack - Incident Handling
DoS Attack - Incident Handling
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Botnets
BotnetsBotnets
Botnets
 
Botnets
BotnetsBotnets
Botnets
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 

Similar to 12 types of DDoS attacks

DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
Zobair Khan
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
HTS Hosting
 
L1803046876
L1803046876L1803046876
L1803046876
IOSR Journals
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
Suzanne Aldrich
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
Vihari Piratla
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
IJITCA Journal
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
IJITCA Journal
 
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
ssuser262297
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
swang2010
 
114331707
114331707114331707
Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
Gaurav Bhatia
 
A041201010
A041201010A041201010
A041201010
ijceronline
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
IJERA Editor
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
IJNSA Journal
 
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
IJNSA Journal
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
extralargesand
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
madlynplamondon
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
leminhvuong
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS Attacks
IRJET Journal
 

Similar to 12 types of DDoS attacks (20)

DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
L1803046876
L1803046876L1803046876
L1803046876
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
DrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoSDrupalCon Vienna 2017 - Anatomy of DDoS
DrupalCon Vienna 2017 - Anatomy of DDoS
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdfMS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
MS_ISAC__DDoS_Attacks_Guide__2023_05.pdf
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
114331707
114331707114331707
114331707
 
Whitepaper on DDoS Mitigation
Whitepaper on DDoS MitigationWhitepaper on DDoS Mitigation
Whitepaper on DDoS Mitigation
 
A041201010
A041201010A041201010
A041201010
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
 
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERSENHANCING THE IMPREGNABILITY OF LINUX SERVERS
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
 
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docxDoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
DoS (Denial of Service) Attack Tutorial Ping of Death, DDOS Wha.docx
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
IRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS AttacksIRJET- A Novel Survey on DOS Attacks
IRJET- A Novel Survey on DOS Attacks
 

More from Haltdos

9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time
Haltdos
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
Haltdos
 
Infographic on overview of Ransomware attacks
Infographic on overview of Ransomware attacksInfographic on overview of Ransomware attacks
Infographic on overview of Ransomware attacks
Haltdos
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
Haltdos
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
Haltdos
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
Haltdos
 
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
Haltdos
 
DDoS Mitigation Techniques for Your Enterprise IT Network
DDoS Mitigation Techniques for Your Enterprise IT NetworkDDoS Mitigation Techniques for Your Enterprise IT Network
DDoS Mitigation Techniques for Your Enterprise IT Network
Haltdos
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
Haltdos
 

More from Haltdos (9)

9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time 9 Steps For Fighting Against a DDos Attack in real-time
9 Steps For Fighting Against a DDos Attack in real-time
 
DDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-HaltdosDDoS Falcon_Tech_Specs-Haltdos
DDoS Falcon_Tech_Specs-Haltdos
 
Infographic on overview of Ransomware attacks
Infographic on overview of Ransomware attacksInfographic on overview of Ransomware attacks
Infographic on overview of Ransomware attacks
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
 
Infographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are importantInfographic - Why DDoS Mitigation Solutions are important
Infographic - Why DDoS Mitigation Solutions are important
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
India MSE Awards Report - AKS IT awarded as "Most Innovative MSE"
 
DDoS Mitigation Techniques for Your Enterprise IT Network
DDoS Mitigation Techniques for Your Enterprise IT NetworkDDoS Mitigation Techniques for Your Enterprise IT Network
DDoS Mitigation Techniques for Your Enterprise IT Network
 
HaltDos DDoS Protection Solution
HaltDos DDoS Protection SolutionHaltDos DDoS Protection Solution
HaltDos DDoS Protection Solution
 

Recently uploaded

Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
TIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup IndustryTIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup Industry
timesbpobusiness
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
HajeJanKamps
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
dazzjoker
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
list of states and organizations .pdf
list of  states  and  organizations .pdflist of  states  and  organizations .pdf
list of states and organizations .pdf
Rbc Rbcua
 
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Lviv Startup Club
 
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 

Recently uploaded (20)

Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
TIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup IndustryTIMES BPO: Business Plan For Startup Industry
TIMES BPO: Business Plan For Startup Industry
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
list of states and organizations .pdf
list of  states  and  organizations .pdflist of  states  and  organizations .pdf
list of states and organizations .pdf
 
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
 
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
 

12 types of DDoS attacks

  • 1. E N T E R P R I S E I T S E C U R I T Y WEB APPLICATION FIREWALL & DDOS MITIGATION SOLUTION 12 TYPES OF DDOS ATTACK www.haltdos.com
  • 2. What is a DDoS attack? DDoS (Distributed Denial of Service) attack is a type of a cyber- attack where an attacker use multiple compromised systems to flood a network/web application with illegitimate traffic and make it unavailable for the legitimate users who are trying to access it.
  • 3. During a DDoS attack, the incoming traffic which is responsible for flooding the victim is originated from many different sources. This efficiently makes it impossible to stop the attack simply by blocking a single IP address and thus, it is very difficult to distinguish between legitimate user traffic and attack traffic when it is spread across too many points of origin which causes a denial of service. How DDoS Attacks Work?
  • 4. In today’s online businesses, DDoS attacks hold for a major concern.  According to the report presented by Akamai - Q3 2017 Security Report, it was concluded that there’s a 179.66% increase in the total number of DDoS attacks since the last 3 years.  Overview
  • 5. Businesses from all over the world have suffered numerous high profile cyber incidents over the past few years; with attacks on Github on Feb 2018 and several attacks on ISPs and Banks all over the world showed us that even a single DDoS attack can have the potential to bring down any business to its knees. DDoS attacks have grown greater and urbane over the years, whether be it flooding a target with a simple ping command based ICMP echo request or complex multi-vector attacks. In this document, we shall overview the different types of DDoS attacks.
  • 6. 1. Application Level Attacks  Application level attacks occur when an attacker attacks a specific application or a website that is poorly coded in order to exploit its weakness. As a result, the entire server gets exhausted and becomes unavailable to the legitimate requests. Websites and applications with security loopholes also fall under the susceptibility for hackers intending to steal information. These loopholes can also be exploited with the help of a simple targeted attack that targets the database. For example WordPress and Joomla are applications that can exhaust a server’s resources.
  • 7. 2. Zero Day (0day) DDoS Zero Day DDoS attacks are the attacks that are unidentified yet they exploit new vulnerabilities. These attacks are not traceable and have undefined defensive mechanisms.  
  • 8. 3. Ping Flood Ping Flood is an application specific type of DDoS attack that is an evolved version of Internet Control Message Protocol (ICMP) flood. In this type of DDoS attack the attacker sends multiple spoofed ping packets to the server through a large set of source IP. The purpose of the attacker is to flood the target with ping packets until it goes offline. It is designed in such a way that it consumes all the resources and bandwidth which are available in the network until it is completely exhausted and finally shuts down. It is not very easily detectable as it closely resembles the legitimate traffic.
  • 9. 4. IP Null Attack The IP packets contain IPv4 headers that enclose all the information about the transport protocol which is being used in the protocol field.  In IP Null attack, the attacker sends packets containing null value (zero) in this field and these packets can neglect security measures which are designed to scan TCP, IP and ICMP. As a result, when the server which is targeted will try to process these packets, it will exhaust its resources and will reboot.
  • 10. 5. NTP Flood NTP is an abbreviation used for Network Time Protocol. It is basically an internet protocol which is used to synchronize the clocks of computers to some time-reference. NTP Flood attack occurs when an attacker sends small packets containing a spoofed IP of the target to internet enabled devices running NTP. These spoofed requests then sends UDP floods as responses from these devices to the target. When the target tries to identify this flood of requests, all its resources gets exhausted and either it goes offline or will reboot.
  • 11. 6. ICMP Flood In an Internet Control Message Protocol (ICMP) Flood Attack occurs when an attacker sends highly-spoofed ICMP packets in huge amount to flood a network. As a result, all the resources and available bandwidth are consumed and the network gets exhausted and it goes offline. ICMP floods can overpower a network with packets containing random or fixed source IP addresses. This attack can be viewed as a Network-Level volumetric attack and thus can be defeated by L3/L4 Packet Filtering. 
  • 12. 7. SYN Flood SYN flood attack occurs when an attacker sends a succession of SYN requests to a targeted system. All the server resources are consumed and the system thus becomes unresponsive to legitimate traffic. By flooding multiple TCP ports on the target system with SYN (synchronize) messages, a SYN-flood DDoS attack takes advantage of the TCP (Transmission Control Protocol) three- way handshake process in order to initiate a connection between the source system and the target system, thus making the system unresponsive to legitimate traffic.
  • 13. 8. UDP Flood Attack UDP stands for User Datagram Protocol that sends short packets of data, called datagrams. UDP flood attack occurs when the attacker tries to flood the target server with large number of spoofed data packets. As a result, all the available bandwidth is consumed and exhausted. Thus, IP server gets down. It is harder for defensive mechanisms to identify a UDP Flood attack since it is an end to end process of communication between client and host.
  • 14. 9. UDP Fragmented Floods The activity generated by the UDP fragmented flood attacks is similar to the UDP flood attack, with a difference that in this case the attacker sends the fragmented data packets to the target server. The target server then tries to put these unrelated and fake fragmented UDP data packets together and eventually fails to do so. As a result, all the available resources get exhausted and this may lead to server reboot.
  • 15. 10. DNS Flood Attack DNS Flood Attack occurs when the attacker sends a large amount of spoofed DNS requests that are exact replica of the real DNS requests from a very large set of source IP. Hence, it is not possible for the target server to differentiate between the real and the fake DNS requests. In order to serve all the requests, the server exhausts all its resources. As a result, the attack consumes all the available bandwidth until it is completely drained out.
  • 16. 11. SIP Flood Attack  Session Initiation Protocol (SIP) is a commonly used signaling protocol which is used to support voice communication, video communication and other multimedia applications. SIP Flood Attack occurs when an attacker sends multiple INVITE requests without waiting for responses from the UAS or the proxy with an aim to exhaust their respective resources.
  • 17. 12. Slowloris Attack In this type of attack first of all the TCP connection is established, then as the multiple requests comes at regular intervals, all the connections are eventually consumed that restrict other servers to connect until some of the connections are released. Thus at this point of time, hackers with limited traffic resources successfully mount a Slowloris attack.
  • 18. info@haltdos.com To learn more visit our website - www.haltdos.com FREE TRIAL S T A R T Y O U R https://app.haltdos.com W E B A P P L I C A T I O N F I R E W A L L & D D O S P R O T E C T I O N Understand the current web application threat landscape, know why traditional network security solutions fail to provide a complete protection against today’s emerging threats and why your organization needs a web application firewall to mitigate IT risks. Sign up at haltdos.com