-
UDP Flood
User Datagram Protocol
The main intention of a UDP flood is to saturate the Internet pipe. Another impact of this attack is on the network and security elements on the way to the target server, and most typically the firewalls. Firewalls open a state for each UDP packet and will be overwhelmed by the UDP flood connections very fast.
-
ICMP (Ping) Flood
Bandwidth attacks
This type of attack can consume both outgoing and incoming bandwidth, since the victim’s servers will often attempt to respond with ICMP Echo Reply packets, resulting a significant overall system slowdown.
-
SYN Flood
Attacks your data
In a SYN flood scenario, the requester sends multiple SYN requests, but either does not respond to the host’s SYN-ACK response, or sends the SYN requests from a spoofed IP address.
-
Ping of Death
Traffic attacks
A large IP packet is split across multiple IP packets, and the recipient host reassembles the IP fragments into the complete packet. Following malicious manipulation of fragment content, the recipient ends up with an IP packet which is larger than 65,535 bytes when reassembled.
-
DDoS Attacks
Bandwidth attacks
In a distributed denial of service (DDoS) attack, the point is to overwhelm and disable a computing resource, usually a website, or perhaps an email server. The attack uses multiple hosts to whip up a traffic tsunami.
-
NTP Amplification
devastating high-bandwidth
An NTP amplification attack begins with a server controlled by an attacker on a network that allows source IP address spoofing. The attacker generates a large number of UDP packets spoofing the source IP address to make it appear the packets are coming from the intended target.