Common DDoS Attacks
DoS attacks are also called flood attacks. They are intended to exhaust the network or system resources on the target computer, causing service interruption or suspension. Consequently, legitimate users fail to access network services. A DDoS attack involves multiple compromised computers controlled by an attacker flooding the targeted server with superfluous requests. Table 1 lists common DDoS attacks.
Attack Type |
Description |
Example |
---|---|---|
Network layer attack |
Occupies the network bandwidth with volumetric traffic, causing your service unable to respond to legitimate access requests. |
NTP flood attack |
Transport layer DDoS attack |
Occupies the connection resources of the server, causing denial of services. |
SYN flood attack and ACK flood attack |
Session layer attack |
Occupies SSL session resources of the server, causing denial of services. |
SSL slow connection attack |
Application layer attack |
Occupies the application processing resources of the server and consumes its processing performance, causing denial of services. |
HTTP GET flood attack and HTTP POST flood attack |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot