0% found this document useful (0 votes)
132 views1 page

Cyber Attacks

The document describes different types of DDoS attacks mapped against the layers of the OSI model, including SYN Flood, UDP Flood, TCP Connection Exhaustion, IPsec Flood, Slow Transfer Rate, and more.

Uploaded by

Shreyas Sanghvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views1 page

Cyber Attacks

The document describes different types of DDoS attacks mapped against the layers of the OSI model, including SYN Flood, UDP Flood, TCP Connection Exhaustion, IPsec Flood, Slow Transfer Rate, and more.

Uploaded by

Shreyas Sanghvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

NETWORK THREATS

DDoS ATTACK TYPES


ACROSS NETWORK LAYERS
OF THE OSI MODEL
A Denial of Service (DoS) attack attempts to deny a user access to a network
resource or service. A Distributed Denial of Service (DDoS) attack originates
from multiple sources, making it far more difficult to defend.

Here, a range of attack types are mapped


against the layers in the Open Systems
Interconnection (OSI) model.

SYN Flood

UDP Flood

Other TCP Floods


(Spoofed and non-Spoofed)

TCP Connection
Exhaustion

IPSec Flood (IKE/


ISAKMP Association
Attempt)

Slow Transfer
Rate

Long Lived TCP


Sessions Smurf Attack

Other Connection ICMP Flood


Flood/Exhaustion
IP/ICMP Fragmentation
SSL Exhaustion

Reflection/
Amplification Attacks
(DNS, NTP, etc.)

Application Request LAYER 1


Floods
PHYSICAL
Other Layer 7 Protocol
Floods (SMTP, DNS, LAYER 2
SNMP, FTP, SIP, etc.)
DATA LINK
Targeted Application
Attacks LAYER 3

Database Connection
NETWORK
Pool Exhaustion LAYER 4
Resource Exhaustion TRANSPORT
Large POST Requests
LAYER 5
HTTP Get Request Exhaustion SESSION
LAYER 6

PRESENTATION
LAYER 7

APPLICATION

Slowloris
Slow POST

LEARN MORE
Slow Read
Mimicked User Browsing

ABOUT DDoS ATTACK HTTPS Encrypted Attacks (any HTTP


attack, Slow Loris, Slow POST, etc.)

PROTECTION

© 2017 Arbor Networks, Inc. All rights reserved. Arbor Networks, the Arbor
Networks logo, ArbOS and ATLAS are all trademarks of Arbor Networks, Inc.
All other brands may be the trademarks of their respective owners.

INFOGRAPHIC/DDoSATTACKTYPES/EN/0917

You might also like