What are the types of DDoS attacks?

Asked 05-May-2022
Viewed 366 times

1 Answer


The types of DDoS attacks:

  • SYN Flood takes use of flaws in the TCP three-way handshake connection sequence. To begin the 'handshake,' the host computer receives a synchronised (SYN) message. The server acknowledges the message by giving the first host an acknowledgement (ACK) flag, after which the connection is closed.
  • A sessionless networking protocol is the User Datagram Protocol (UDP). A UDP flood uses UDP packets to flood random ports on a machine or network. The host looks for an application that is listening on those ports, but none is identified.
  • HTTP Flood appears to be a hacker exploiting genuine GET or POST requests. It consumes less bandwidth than other assaults, but it can force the server to use all available resources.
  • By sending malicious pings to a system, Ping of Death manipulates IP protocols. This was a common DDoS attack two decades ago, but it is no longer as effective.
  • A Smurf Attack uses the malware programme smurf to exploit Internet Protocol (IP) and Internet Control Message Protocol (ICMP). It spoofs an IP address and pings IP addresses on a network using ICMP.

Read More: Why is VPN important for network security?