DDoS attacks

DDoS attacks occurs when compromised devices flood the network traffic of a targeted system. This type of attack threatens the availability of the system. When it comes to DDoS attacks, there are four attack vectors:

  • Volumetric attack: This floods the victim using the organization's bandwidth.
  • Fragmentation attacks: This attack exploits datagram fragmentation mechanisms by preventing the  reassembling back of fragmented data packets. It is also called Teardrop attack. 
  • TCP state-exhaustion attack: This attack exhaust the  number of concurrent connections supported by web servers, load balancers and firewalls.
  • Application layer attack: This uses application weaknesses to disable the service. As shown in the following graph, an ...

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.