
DNS Flood
DNS amplification is an asymmetrical DDoS attack in which the attacker sends out a small look-up query with spoofed target IP
UDP Amplification
By design, UDP is a connection-less protocol that does not validate source Internet Protocol (IP) addresses
HTTP Flood
HTTP Flood is a type of DDoS attack in which the attacker manipulates HTTP and POST unwanted requests
Ping of Death
A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the Internet Protocol header
Spoofing
Situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage
TCP SYN Flood
DDoS attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive
Slowloris
Allows a single machine to take down another machine's web server with minimal bandwidth and side effects on unrelated services and ports
Connection Flood
By flooding the server with requests for new connections, it prevents legitimate requests from being established and served
Brute Force
The attacker systematically checks all possible passwords and passphrases until the correct one is found
Smurf
DDoS in which large numbers of ICMP packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address