



The TCP/IP protocol has a bug that prevents the server reassembling such packets. Teardrop Attack: The attack that involves sending fragmented packets to the targeted device.DNS Flood The attacker floods a particular domain’s DNS servers in an attempt to disrupt DNS resolution for that domain.Clients will eventually be denied further connection attempts. Slowloris: Invented by Robert ‘RSnake’Hansen says that this attack attempts to keep multiple connections to the target server open for as long as possible.Smurf attack and ICMP flood exploit this by flooding the server with ICMP request without waiting for a response. ICMP Protocol Attacks: Attacks on the ICMP protocol take advantage of the fact that each request requires processing by the server before a response is sent back.Ping flood is the current form of this attack. This problem has been mostly fixed in newer systems. Legacy servers can often crash if the total number of packets exceeds 65,536 bytes. TCP/IP fragmentation is a method of separating large packets into smaller packets. Ping of Death Attacks involve the deliberate sending of IP packets larger than those allowed by the IP protocol.UDP Flood A type of attack in which random ports on the target are overwhelmed by IP packets containing UDP datagrams.HTTP Flood A type of attack in which HTTP GET or POST requests are used to attack the web server.This attack exploits weaknesses of the TCP connection sequence known as a 3-way handshake. SYN Flood A succession of SYN requests is directed to the target’s system in an attempt to overwhelm it.UDP Flood, TCP Flood, NTP Amplification DNS AmplificationHere are some examples. Volumetric attacks are easy to generate by employing simple amplification techniques, so these are the most common forms of attack. Volumetric Attacks send high volumes of traffic in an effort to saturate a victim’s bandwidth. Syn Flood and Ping of Death are some examples. Such attacks use all the processing power of the victim or other crucial resources (a firewall, for instance) and cause service disruptions. Protocol Based Attacks focus on exploiting a weakness in Layers 3 or 4 of the protocol stack. An example of this is the HTTP Flood attack. These attacks are difficult to detect and mitigate. They establish a connection with the target and then exhaust server resources by monopolizing transactions and processes.

These attacks exploit a weakness within the Layer 7 protocol stack. DoS or DDoS attacks are designed to cause enough network or server resources to be unresponsive to legitimate requests.Īpplication Layer Attacks go after web applications, and often use the most sophistication.
