HTTP Flood What is an HTTP Flood Attack. HTTP flood is a type of Distributed Denial of Service attack in which the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application.
Ping Flood (ICMP Flood) What is a Ping Flood Attack. Ping flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim's computer by overwhelming it with ICMP echo requests, also known as pings.
NTP Amplification What is an NTP Amplification Attack. NTP amplification is a type of Distributed Denial of Service attack in which the attacker exploits publically-accessible Network Time Protocol (NTP) servers to overwhelm the targeted with User Datagram Protocol (UDP) traffic.
Ping of Death (a.k.a. PoD) is a type of Denial of Service attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
But in the end, if the attack is unmitigated, Slowloris—like the tortoise—wins the race. Incapsula mitigates a massive HTTP flood: 690,000,000 DDoS requests from 180,000 botnets IPs. If undetected or unmitigated, Slowloris attacks can also last for long periods of time.
TCP SYN Flood What is a SYN Flood Attack. TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.
UDP Flood What is a UDP Flood Attack “UDP flood” is a type of Denial of Service attack in which the attacker overwhelms random ports on the targeted host with IP packets containing UDP datagrams. The receiving host checks for applications associated with these datagrams and—finding none—sends back a “Destination Unreachable” packet.