This document summarizes a survey of distributed denial-of-service (DDoS) attacks based on vulnerabilities in the TCP/IP protocol stack. It begins by introducing DDoS attacks and their architecture, then classifies DDoS attacks according to the TCP/IP layer they target - application layer, transport layer, or internet layer. Specific attack types are described for each layer, including HTTP flooding, SYN flooding, Smurf attacks, and more. The document aims to provide understanding of existing DDoS attack tools, methods, and defense mechanisms.