Smurf Attack: This attack uses a malware program called smurf.SSDP: An SSDP (Simple Service Discovery Protocol) attack is a reflection-based DDoS attack that exploits Universal Plug and Play (UPnP) networking protocols in order to send an amplified amount of traffic to a targeted victim.The volume of replies can overwhelm the victim. SNMP Reflection: The attacker forges the victim’s IP address and blasts multiple Simple Network Management Protocol (SNMP) requests to devices.NTP Amplification: A reflection-based volumetric DDoS attack in which an attacker exploits a Network Time Protocol (NTP) server functionality in order to overwhelm a targeted network or server with an amplified amount of UDP traffic.DNS Amplification: This reflection-based attack turns legitimate requests to DNS (domain name system) servers into much larger ones, in the process consuming server resources.A bug in the TCP/IP protocol prevents the server from reassembling such packets, causing the packets to overlap. Teardrop Attack: The attack that involves sending fragmented packets to the targeted device.DNS Flood: The attacker floods a particular domain’s DNS servers in an attempt to disrupt DNS resolution for that domain.Eventually, additional connection attempts from clients will be denied. Slowloris: Invented by Robert ‘RSnake’ Hansen, this attack tries to keep multiple connections to the target web server open, and for as long as possible.Smurf attack, ICMP flood, and ping flood take advantage of this by inundating the server with ICMP requests without waiting for the response. ICMP Protocol Attacks: Attacks on the ICMP protocol take advantage of the fact that each request requires processing by the server before a response is sent back.
Ping flood is the present-day incarnation of this attack. This has largely been fixed in newer systems. If the packets, when put together, are larger than the allowable 65,536 bytes, legacy servers often crash. TCP/IP fragmentation deals with large packets by breaking them down into smaller IP packets.