Dos Attack: Fraggle Attack

Security Engineer Career

Common Types Of DDoS Attacks

Distributed denial-of-service (DDoS), is a subclass in DoS attacks. Multiple connected online devices are known as a botnet and are used to overwhelm a target site with fake traffic.

DDoS attacks are not designed to penetrate your security perimeter, unlike other cyberattacks. DDoS attacks are designed to make your website and servers unavailable to legitimate users. DDoS attacks can also serve as a smokescreen to conceal other types of malicious activity and to disable security devices that could be used to penetrate the target’s security perimeter. Successful DDoS attacks can be easily noticed and have a significant impact on the entire internet user base. It is a popular weapon for hackers, cyber vandals, extortionists, and hacktivists who want to prove a point.

DDoS attacks can be devastating and can last weeks, days, or even months. In the worst cases, DDoS attacks can lead to loss of revenue, weaken consumer trust, cause long-term reputation damage, and force businesses to spend huge amounts in compensation.

Common DDoS attacks types

  • UDP Flood
    The User Datagram Protocol is a sessionless network protocol. Random ports are used to attack computers or networks with UDP packets.
  • SYN Flood
    SYN Flood is a DDoS attack that exploits flaws in the TCP connection sequence. It’s also known as a three-way handshake. The host machine receives a synchronized message (SYN), which begins the “handshake”. The server acknowledges the message and sends an acknowledgment flag (ACK) to the original host. This closes the connection. SYN floods are when spoofed messages get sent, and the connection does NOT close.
  • HTTP Flood
    HTTP Flood is an attack that exploits a hacker’s authorization to send GET and POST requests. Although this DDoS attack consumes less bandwidth than other attacks, it can force servers to use maximum resources.
  • The Ping of Death
    Ping of death is a DDoS attack that manipulates IP protocols through malicious pings. Although this DDoS attack was very popular in the past, it is now less effective.
  • Smurf Attack
    Smurf Attacks are responsible for exploiting Internet Protocol and Internet Control Message Protocol. It creates an IP address spoofing it and then uses ICMP for pinging IP addresses on a network.
  • Fraggle Attack
    This DDoS attack sends huge amounts of UDP traffic over a router’s broadcast network. Similar to a smurf, it uses UDP rather than ICMP.
  • Application-Level Attacks
    This is done by exploiting flaws in the application DDoS attack typeset that do not target the entire server. However, it will target applications that have known vulnerabilities.
  • Slowloris
    Slowloris targets web servers and uses very few resources. Slowloris connects with the target and keeps the connection open as long as it can.HTTP flooding.
  • Advanced Persistent DoS
    Advanced PersistentDoS (APDoS).Hackers who want to do serious damage use this technique. These hacker attacks can go on for weeks because they change tactics quickly and create diversions to get around security defenses.
  • NTP Amplification
    NTP Amplification, also known as amplified reflection attack, exploits Network Time Protocol servers (NTP), a network protocol used for synchronizing computer clocks. It is designed to overwhelm UDP traffic. Because the server’s response is disproportional to the original request, it’s called “amplified”.
  • Zero-day DDoS Attacks
    New is called a Zero-day DDoS attack.DDoS attack methods can exploit vulnerabilities that haven’t been fixed yet.

Comodo cWatch Will Help Protect You Against DDoS Attacks

Comodo cWatch incorporates a Web Application Firewall (WAF) provisioned over a Secure Content Delivery Network (CDN). It is a fully capable website security tool that comes with a Cyber Security Operation Center (CSOC) staffed with certified security analysts and powered by a Security Information and Event Management (SIEM) capable of leveraging data from more than 85 million endpoints to detect and mitigate threats even before they occur.

As a DDoS prevention tool, cWatch offers you the following key features that deliver total security.

  • Malware Monitoring and Resolution
    It detects malware and provides tools and methods to remove it.
  • Secure Content Delivery Network (CDN).
    A distributed network of servers worldwide that can distribute the DDoS attack’s load and minimize its effects.
  • Security Information and Event Management (SIEM).
    Enhance intelligence by leveraging data from over 85M+ domains and endpoints, so you have global visibility of the most recent events.DDoS attacks.
  • Web Application Firewall (WAF).
    Website and web application protection that is powerful and real-time. Provides advanced security, intrusion protection, and filtering to block DDoS attacks.
  • Cyber Security Operations Center (CSOC).
    An expert team of certified cybersecurity professionals is available 24/7 to provide all necessary surveillance and remediation services to protect you from constantly changing threats.
  • PCI Scanning
    Allows merchants and service providers to remain compliant with PCI-DSS

The following are some of the benefits that DDoS prevention tools offer:

  • Reduced Risks
    You can plan for a malware attack by using detailed activity reports.
  • It saves time and effort
    Once cWatch has been installed on your site, it will automatically clean and check your website.
  • Protect your reputation
    DDoS prevention helps protect your brand, revenue stream, and brand from short-term and long-term damage.