A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of dos Attack

Advanced ​Persistent Threat​
Advanced ​Persistent Threat​

An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity. An APT usually targets either private organizations, states or both for business or political motives.

Ping of Death​
Ping of Death​

Ping of Death (a.k.a. PoD) is a type of Denial of Service attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.

source: incapsula.com
Reflection ​Attack​
Reflection ​Attack​

DDoS Reflection. A basic Denial of Service attack is essentially a traffic flood, designed to exhaust bandwidth, memory or other resources at the target machine.

Slowloris​
Slowloris​

Slowloris What is Slowloris? Developed by Robert “RSnake” Hansen, Slowloris is DDoS attack software that enables a single computer to take down a web server.

source: incapsula.com
Smurf Attack​
Smurf Attack​

A Smurf attack is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable. The Smurf program accomplishes this by exploiting vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).

SYN Flood​
SYN Flood​

TCP SYN Flood What is a SYN Flood Attack. TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive.

source: incapsula.com
UDP Flood ​Attack​
UDP Flood ​Attack​

A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol.. Using UDP ...

Zero-day​
Zero-day​

Zero-day vulnerabilities present serious security risks, leaving you susceptible to zero-day attacks, which can result in potential damage to your computer or personal data. Learn how to keep your computer and data safe.

source: us.norton.com