A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Ddos Attacks

HTTP Flood
HTTP Flood

HTTP Flood What is an HTTP Flood Attack. HTTP flood is a type of Distributed Denial of Service attack in which the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application.

source: incapsula.com
ICMP (Ping) Flood
ICMP (Ping) Flood

Ping Flood (ICMP Flood) What is a Ping Flood Attack. Ping flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim's computer by overwhelming it with ICMP echo requests, also known as pings.

source: incapsula.com
NTP Amplification
NTP Amplification

NTP Amplification What is an NTP Amplification Attack. NTP amplification is a type of Distributed Denial of Service attack in which the attacker exploits publically-accessible Network Time Protocol (NTP) servers to overwhelm the targeted with User Datagram Protocol (UDP) traffic.

source: incapsula.com
Ping of Death
Ping of Death

Ping of Death (a.k.a. PoD) is a type of Denial of Service attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.

source: incapsula.com
Slowloris
Slowloris

But in the end, if the attack is unmitigated, Slowloris—like the tortoise—wins the race. Incapsula mitigates a massive HTTP flood: 690,000,000 DDoS requests from 180,000 botnets IPs. If undetected or unmitigated, Slowloris attacks can also last for long periods of time.

source: incapsula.com
image: youtube.com
SYN Flood
SYN Flood

TCP SYN Flood What is a SYN Flood Attack. TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.

source: incapsula.com
UDP Flood
UDP Flood

UDP Flood What is a UDP Flood Attack “UDP flood” is a type of Denial of Service attack in which the attacker overwhelms random ports on the targeted host with IP packets containing UDP datagrams. The receiving host checks for applications associated with these datagrams and—finding none—sends back a “Destination Unreachable” packet.

source: incapsula.com