Useful Links
Computer Science
Cybersecurity
DDoS Attacks and Mitigation
1. Introduction to Denial-of-Service Attacks
2. Foundational Networking Concepts for DDoS
3. Anatomy of a DDoS Attack
4. Classification of DDoS Attacks
5. DDoS Attack Infrastructure
6. DDoS Detection Techniques
7. DDoS Mitigation Strategies
8. Mitigation Technologies and Techniques
9. Advanced Topics and Future Trends
Classification of DDoS Attacks
Volumetric Attacks (Bandwidth Saturation)
Attack Goals and Objectives
UDP Flood Attacks
Random Port Targeting Techniques
Reflection and Amplification Methods
ICMP Flood Attacks
Ping Flood Variations
Smurf Attack Mechanisms
Amplification-Based Attacks
Third-Party Server Exploitation
Response Multiplication Techniques
Protocol Attacks (State-Exhaustion)
Resource Consumption Objectives
SYN Flood Attacks
Incomplete Handshake Exploitation
Connection Table Exhaustion
Ping of Death Attacks
Oversized Packet Transmission
Buffer Overflow Exploitation
Smurf Attack Variations
ICMP Broadcast Amplification
Network-Level Amplification
Fragmentation Attacks
Overlapping Fragment Techniques
Reassembly Resource Exhaustion
Application Layer Attacks (Layer 7)
Application Resource Targeting
HTTP Flood Attacks
GET Request Floods
Repeated Resource Requests
Cache Bypass Techniques
POST Request Floods
Large Payload Submissions
Form Data Exploitation
Slow-Rate Attack Techniques
Slowloris Attacks
Partial HTTP Request Maintenance
Connection Pool Exhaustion
R.U.D.Y. (R-U-Dead-Yet?) Attacks
Slow POST Data Transmission
Application Thread Exhaustion
Low and Slow Attack Methods
Connection Holding Strategies
Resource Starvation Techniques
API-Based Attacks
Web API Targeting
Automated Request Generation
Previous
3. Anatomy of a DDoS Attack
Go to top
Next
5. DDoS Attack Infrastructure