12 Types of DDoS Attacks Used By Hackers

12 Types of DDoS Attacks

Distributed denial of service (DDoS) attacks are a growing concern with far-reaching effects for businesses and organizations of all sizes. DDoS attacks are used by criminal enterprises, politically-motivated cyber terrorists, and hackers hoping to bring websites down for fun or profit.

Denial of service occurs when a target machine is flooded with malicious traffic until resources are exhausted and the system goes offline. Distributed denial of service works much the same way, except in this particular instance the attack is amplified by enlisting other machines and computers in the attack. Most large-scale DDoS attacks rely on botnets.

DDoS Attacks Are Getting Stronger, More Sophisticated, and Difficult to Stop

The current climate of cyber threats has been well documented and highlighted in the media. Banks and financial institutions faced countless attacks during 2012 and attacks have evolved to become more effective. Distributed denial of service attacks have also been used as distractions to divert attention from fraud and network intrusion.

Now, more than ever, it is crucial for organizations and online retailers to measure their risk of attack and create a DDoS attack protection plan in advance in order to mitigate risk and enable a fast recovery.

Here are some common forms of DDoS attacks (both past and present):

UDP Flood

User Datagram Protocol is a sessionless networking protocol. One common DDoS attack method is referred to as a UDP flood. Random ports on the target machine are flooded with packets that cause it to listen for applications on that those ports and report back with a ICMP packet.

SYN Flood

A “three-way handshake”, which is a reference to how TCP connections work, are the basis for this form of attack. The SYN-ACK communication process works like this:

  • First, a “synchronize”, or SYN message, is sent to the host machine to start the conversation.
  • Next, the request is “acknowledged” by the server. It sends an ACK flag to the machine that started the “handshake” process and awaits for the connection to be closed.
  • The connection is completed when the requesting machine closes the connection.

A SYN flood attack will send repeated spoofed requests from a variety of sources at a target server. The server will respond with an ACK packet to complete the TCP connection, but instead of closing the connection the connection is allowed to timeout. Eventually, and with a strong enough attack, the host resources will be exhausted and the server will go offline.

Ping of Death

Ping of death (”POD”) is a denial of service attack that manipulates IP protocol by sending packets larger than the maximum byte allowance, which under IPv4 is 65,535 bytes. Large packets are divided across multiple IP packets – called fragments – and once reassembled create a packet larger than 65,535 bytes. The resulting behemoth packet causes servers to reboot or crash.

Note: This was a real problem in early years (think 1996), but doesn’t have the same effect these days. Most ISPs block ICMP or “ping” messages at the firewall. However, there are many others forms of this attack that target unique hardware or applications. Some other names are “Teardrop”, “Bonk”, and “Boink”.

Reflected Attack

A reflected attack is where an attacker creates forged packets that will be sent out to as many computers as possible. When these computers receive the packets they will reply, but the reply will be a spoofed address that actually routes to the target. All of the computers will attempt to communicate at once and this will cause the site to be bogged down with requests until the server resources are exhausted.

Peer-to-Peer Attacks

Peer-to-Peer servers present an opportunity for attackers. What happens is instead of using a botnet to siphon traffic towards the target, a peer-to-peer server is exploited to route traffic to the target website. When done successfully, people using the file-sharing hub are instead sent to the target website until the website is overwhelmed and sent offline.

Nuke

Corrupt and fragmented ICMP packets are sent via a modified ping utility to keep the malicious packets to be delivered to the target. Eventually, the target machine goes offline. This attack focuses on comprising computer networks and is an old distributed denial of service attack.

Slowloris

This type of distributed denial of service attack can be especially difficult to mitigate. It’s most notable use was in the 2009 Iranian Presidential election. Slowloris is a tool that allows an attacker to use fewer resources during an attack. During the attack connections to the target machine will be opened with partial requests and allowed to stay open for the maximum time possible. It will also send HTTP headers at certain intervals. This adds to the requests, but never completes them – keeping more connections open longer until the target website is no longer able to stay online.

Degradation of Service Attacks

The purpose of this attack is to slow server response times. A DDoS attack seeks to take a website or server offline. That is not the case in a degradation of service attack. The goal here is to slow response time to a level that essentially makes the website unusable for most people. Zombie computers are leveraged to flood a target machine with malicious traffic that will cause performance and page-loading issues. These types of attacks can be difficult to detect because the goal is not to take the website offline, but to degrade performance. They are often confused with simply an increase in website traffic.

Unintentional DDoS

Unintended distributed denial of service happens when a spike in web traffic causes a server to not be able to handle all of the incoming requests. The more traffic that occurs, the more resources are used. This causes pages to timeout when loading and eventually the server will fail to respond and go offline.

Application Level Attacks

Application level attacks target areas that have more vulnerabilities. Rather than attempt to overwhelm the entire server, an attacker will focus their attack on one – or a few – applications. Web-based email apps, WordPress, Joomla, and forum software are good examples of application specific targets.

Multi-Vector Attacks

Multi-vector attacks are the most complex forms of distributed denial of service (DDoS) attack. Instead of utilizing a single method, a combination of tools and strategies are used to overwhelm the target and take it offline. Often times, multi-vector attacks will target specific applications on the target server, as well as, flood the target with a large volume of malicious traffic. These types of DDoS attacks are the most difficult to mitigate because the attack come in different forms and target different resources simultaneously.

Zero Day DDoS

A “Zero Day” based attack is simply an attack method that to date has no patches. This is a general term used to describe new vulnerabilities and exploits that are still new.

As you can see, the types of DDoS attacks vary, but all can affect your website’s performance.

Get DDoS Protection

In the growing climate of cyber groups and criminals using distributed denial of service as a way to disrupt businesses and take websites offline, it’s vital to incorporate DDoS attack protection into your business continuity plan. DDoS protection is insurance for your online presence. If you need help stopping DDoS attacks on your website you can contact us here.

Get The Latest Updates

Get tips on business, marketing, cyber security and the internet.

Comments

  1. It’s amazing how many ways hackers can find to harm other people and companies. I used to work for a large nonprofit (more than 1 million website visits per month) and people were constantly trying to hack/attack our site.

  2. I just want to know if you are running a business and someone does this, how can you resolve this problem, how you stop them and how do you find out how they got in, if you have your own server?

    • Rivalhost says:

      It really depends upon the type of attack and the volume of traffic the attacker is extending. If you own your own server you can look for connections that are being allowed to timeout or certain IPs that are connecting in suspicious patterns.

      It is incredibly difficult to mitigate attacks without 1) having specialized software / hardware that helps automate the mitigation and 2) a big network behind you. With attacks becoming as strong as they are you really have to be able to withstand large amounts of traffic, which takes a lot of bandwidth.

      You can always enlist a service provider as well. If you manage your own server it’s feasible to get proxy protection and your DDoS protection provider will be able to offer remote protection.

  3. Robert Jooste says:

    Have you tried reading this blog on a phone?

    That share popup thing is very annoying and you cant get rid of itor move it.

    I could not read the article. Very useless.

Leave a Comment

Please only use your real name, not your business name or keywords. All comments are moderated before they appear on the site. Let's have a personal and meaningful conversation.

*