{"id":29357,"date":"2022-08-23T15:40:31","date_gmt":"2022-08-23T15:40:31","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=29357"},"modified":"2023-07-07T09:54:06","modified_gmt":"2023-07-07T09:54:06","slug":"12-common-types-of-ddos-attacks-explained","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/","title":{"rendered":"12 Common Types of DDoS Attacks Explained"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A <\/span><span style=\"font-weight: 400;\">DDoS attack<\/span><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\"> or Distributed-Denial-of-Service attack, is a type of cybercrime where threat actors maliciously attempt to make a website or application unavailable to users. <\/span><b>Different types of DDoS attacks<\/b><span style=\"font-weight: 400;\"> exist to overwhelm a server with illegitimate traffic, causing an online service to shut down temporarily or permanently.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do you know <\/span><span style=\"font-weight: 400;\">how a DDoS attack works<\/span><span style=\"font-weight: 400;\">? It exploits malware-infected devices called bots, and a cluster of bots is referred to as a botnet. Cyberactors use them to disrupt a system without an owner\u2019s permission, awareness, and consent.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are multiple <\/span><b>types of DDoS attacks<\/b><span style=\"font-weight: 400;\"> that target varying components of a network connection, typically grouped into three categories: Application layer, protocol, and volumetric attacks\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But before learning about them, it\u2019s useful to understand how a network connection is made.<\/span><\/p>\n<h2><b>How is a Network Connection Made?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A network connection is made up of multiple layers, and each one of them has a distinct purpose. The Open Systems Interconnection (OSI) Model characterizes the various functions that support operability among online devices, products, and services.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As per the OSI model, these communications work together to establish a network connection and comprise seven layers in a framework:<\/span><\/p>\n<h3><b>Layer 7- Application Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A human-computer interaction layer for end-users to access network services.<\/span><\/p>\n<h3><b>Layer 6- Presentation Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This layer maintains the data in a usable format and defines how two devices should encode, encrypt, and compress data.\u00a0<\/span><\/p>\n<h3><b>Layer 5- Session Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Creates a communication channel after authentication and ensures sessions remain open during data transfer. Once the data is transferred, it closes them.\u00a0<\/span><\/p>\n<h3><b>Layer 4- Transport Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Receives the data transferred in the session layer and breaks it into \u2018segments.\u2019 Its job is to reassemble the segments or data packets on the receiving end, ultimately regulating the transfer of data.<\/span><\/p>\n<h3><b>Layer 3- Network Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Breaks segments into network packets, followed by reassembling and routing them to the right path. This layer delivers frames from layer-2 to the intended destination using IP addresses, etc.<\/span><\/p>\n<h3><b>Layer 2- Datalink Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Responsible for starting and ending a connection between two physically connected nodes on a network.\u00a0<\/span><\/p>\n<h3><b>Layer 1- Physical Layer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Layer 1 defines the connector and electrical cable to transfer raw data.<\/span><\/p>\n<h2><b>Application Layer Attacks<\/b><\/h2>\n<p><b>Common types of DDoS attacks<\/b><span style=\"font-weight: 400;\"> include application layer attacks designed to hit the application itself. They exploit specific system vulnerabilities (like SIP voice services, web servers, and BGP) so that applications fail to deliver the desired content to their users.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compared to volumetric and protocol attacks, application layer attacks require fewer resources to disrupt particular functions or features of a website. They mimic legitimate user behavior, making them hard to identify.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is dangerous as the latest <\/span><span style=\"font-weight: 400;\">tools used during a DDoS attack<\/span><span style=\"font-weight: 400;\"> can access millions of botnets and harm systems at scales never seen before. The magnitude of such attacks are usually measured in requests per second. Here are two popular sub-categories of application layer attacks:<\/span><\/p>\n<h3><b>Attacks Targeting DNS Servers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The DNS or Domain Name System turns domain names into IP addresses used by your browser to show results.\u00a0 As DNS servers are linked to domain name information, attackers can target them to attempt <\/span><span style=\"font-weight: 400;\">DDoS or Dos attacks<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers use spoofing and amplification, making a small query reflect a more extensive response in bytes. They attack DNS servers using bots to generate fake DNS requests for an amplification record.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The server issues its own request to an infected server to access the amplification record. The entire process also involves <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-spoofing-definition-and-explanation\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">spoofing<\/span><\/a><span style=\"font-weight: 400;\"> and occurs at Layers 3 or 4 of the OSI model.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DNS flood attacks overwhelm DNS servers by sending legitimate-looking DNS requests from multiple spoofed IP addresses (bots) at a high packet rate. Amplified DNS floods are mightier, targeting recursive DNS servers with large volumes of DNS requests.\u00a0<\/span><\/p>\n<h3><b>HTTP\/S Encrypted Flood<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">HTTP or HTTPS encrypted floods attacks occur at Layer 7 of the OSI model. As the name implies, these <\/span><b>common types of DDos attacks<\/b><span style=\"font-weight: 400;\"> flood servers with HTTP requests from single or multiple URLS stemming from a botnet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">HTTP floods aim to deplete web servers\u2019 resources with continuous requests and can comprise scripts and images (GET), forms and files (POST), or combined GET and POST HTTP requests. More sophisticated attacks may also use DELETE, PUT, etc. requests.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A denial of service occurs once the server reaches its maximum amount of simultaneous connections and is unable to respond to legitimate user requests.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While difficult to discover, knowing <\/span><span style=\"font-weight: 400;\">how to identify a DDoS attack<\/span><span style=\"font-weight: 400;\"> like this can help mitigate the repercussions.<\/span><\/p>\n<h2><b>Protocol Attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Protocol attacks aim to exhaust server resources and intermediate communication equipment\u2014the mediator between a website and a server. They work by overburdening server resources with phony protocol requests to occupy available resources.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are four common <\/span><b>DDoS attack types<\/b><span style=\"font-weight: 400;\"> under this category:<\/span><\/p>\n<h3><b>Ping of Death<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Here, threat actors manipulate IP protocols by sending ping packets to the victim server that are larger than the maximum size allowed The Ping of Death (PoD) is an outdated <\/span><b>type of DDoS attack<\/b><span style=\"font-weight: 400;\">, but it\u2019s still used to target applications and hardware.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It either crashes a server or reboots it, taking down an entire data center. While PoD attacks are less prevalent today, a related <\/span><b>DDoS attack type<\/b><span style=\"font-weight: 400;\"> known as an ICMP flood is much more common. You can read about it under volumetric attacks.<\/span><\/p>\n<h3><b>SYN Flood<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The TCP or transmission control protocol is a communication structure interlinked to a client, host, and server operating at layer 4. Malicious actors exploit TCP vulnerabilities and send SYN packets to the targeted server using spoofed source IPs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SYN is short for synchronized TCP packets sent to another computer when a client tries to establish a TCP connection to a server. SYN floods are also known as TCP floods or SYN-TCP floods and use up connection resources on backend servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The spoofed packets are sent until the table memory connection crashes, which shuts down an online service. With the TCP backlog saturated, the server can\u2019t receive any new connections.<\/span><\/p>\n<h3><b>Tsunami SYN Flood<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A Tsunami SYN flood attack is a more aggressive type of DDoS attack. While a regular SYN flood typically contains low amounts of data, this variation is characterized by packets with around 1,000 bytes each.<\/span><\/p>\n<h3><b>Connection Exhaustion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In a connection exhaustion attack, hackers target infrastructure components like Next Gen Firewalls, web application servers, and edge load balancers to overwhelm connection state tables with fake data. This <\/span><b>DDoS attack type<\/b><span style=\"font-weight: 400;\"> helps threat actors monitor and adjust their attacks for high-intensity impact.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They\u2019re usually planned using discrete intelligent clients that can\u2019t be spoofed. It\u2019s nearly impossible to avert or mitigate them in stateless edge router infrastructures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also known as state-exhaustion attacks, these <\/span><b>types of DDoS attacks <\/b><span style=\"font-weight: 400;\">use less bandwidth (up to 20 gigabits per second), so they\u2019re often considered less dangerous.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That said, attackers have adapted standard connection exhaustion, TCP, and flood attacks to target secure socket layer (SSL) services too. Network communication protocols often use SSL for encryption purposes, to enhance security, and address privacy issues.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSL state-exhaustion DDoS attacks usually target the SSL handshake protocol in one of two ways:\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">By exploiting the SSL handshake protocol itself with continuous encryption renegotiation requests that exhaust resources, making services unavailable to legitimate users.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">By sending invalid data packets to SSL servers that waste time and resources processing such data as legitimate, causing connection problems for real users.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Most firewalls can\u2019t mitigate these <\/span><b>DDoS attack types<\/b><span style=\"font-weight: 400;\"> as they\u2019re unable to differentiate between authentic and fake SSL handshake data packets.<\/span><\/p>\n<h2><b>Volumetric Attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Volumetric attacks deplete a targeted website\u2019s bandwidth using amplification methods. This <\/span><b>DDoS attack type<\/b><span style=\"font-weight: 400;\"> is measured in Bps or bits per second. Usually, request sizes are in the 100s of Gbps, however, some latest incidents have recorded over 1 Tbps as well.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What motivates DDoS attacks<\/span><span style=\"font-weight: 400;\"> of this type is the stealth aspect.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They\u2019re difficult to trace, appearing as authentic traffic generated by multiple IP addresses but originating from an attacker\u2019s bot network.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Volume-based DDoS attacks serve to halt legitimate traffic and shut down entire websites. Here are some of the most notorious types:<\/span><\/p>\n<h3><b>DNS Amplification<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DNS amplification exploits public DNS servers to overburden a targeted network with traffic congestion. Bad actors send DNS name lookup requests to a public DNS server by spoofing the source IP address as the target\u2019s IP address.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, the DNS record response is sent to the target instead. These spoofed requests are of \u2018ANY\u2019 type, thus, all the details are packed in a single request. As such, they generate large responses so the victim web resource receives amplified traffic, clogging the network with traffic and rendering it inaccessible.<\/span><\/p>\n<h3><b>UDP Flood<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The <\/span><b>different types of DDoS attacks<\/b><span style=\"font-weight: 400;\"> include the UDP flood, where hackers target random ports on the host with high numbers of small User Datagram Protocol (UDP) packets. UDP is a communication protocol that establishes low-latency and loss-tolerating connections between internet applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A UDP flood attack depletes vital network element resources, overwhelming the target system and causing a denial of service. It can be done using a spoofed IP address to ensure return packets don\u2019t reach the host and help cybercriminals conceal their identity.\u00a0<\/span><\/p>\n<h3><b>ICMP or Ping Flood<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">ICMP or the Internet Control Message Protocol is used to communicate problems related to transferring data online. Attackers overwhelm a network with numerous spoofed ICMP echo requests. ICMP echo requests (pings) and echo-reply messages are used to evaluate a network\u2019s connectivity strength. Most of the time, such requests receive replies, which use up network resources. Flooded with these request packets, online services become unavailable to users.<\/span><\/p>\n<h3><b>RST-FIN Flood<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In the transmission control protocol (TCP), attackers use spoofed RST or FIN packets to saturate bandwidth, occupy resources, and interrupt network activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While SYN packets are sent to establish new TCP connections, FIN packets are sent to close TCP connections. Meanwhile, RST packets are typically used to forcefully reset connections by aborting them when there\u2019s an issue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During this<\/span><b> type of DDoS attack<\/b><span style=\"font-weight: 400;\">, threat actors send high volumes of spoofed RST and FIN packets to use up the victim network\u2019s resources. This, in turn, causes disruptions, ultimately leading to system failures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although RST-FIN floods aren\u2019t as prevalent today, cyber criminals still use them in conjunction with other attack types.<\/span><\/p>\n<h3><b>Smurf Attacks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A smurf attack occurs at the third layer of the OSI model and is similar to the ICMP flood attack. Its name stems from a DDoS attack tool named after the cartoon show <\/span><i><span style=\"font-weight: 400;\">The Smurfs<\/span><\/i><span style=\"font-weight: 400;\">, as it could hit larger enemies.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Smurf attacks overload a network with malicious ICMP echo requests or pings and exploits IP vulnerabilities. A false or spoofed IP address is attached to a data packet to send these requests.<\/span><\/p>\n<h3><b>Summary<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The most common <\/span><span style=\"font-weight: 400;\">DDoS attack types<\/span><span style=\"font-weight: 400;\"> fall under application layer attacks, protocol attacks, and volumetric attacks. They occur at different layers of the OSI model.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While application layer attacks exploit specific vulnerabilities and forge legitimate user actions, protocol attacks eat up server communication resources with invalid requests. Volumetric attacks focus on flooding victim networks with seemingly authentic traffic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber actors today often use a combination of DDoS attack types and other cyberattacks. While it helps knowing <\/span><span style=\"font-weight: 400;\">what industries DDoS attackers target<\/span><span style=\"font-weight: 400;\">, no industry or organization is safe against such threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s not easy to detect a DDoS attack until the harm is done, so it&#8217;s better to strengthen your security protocols and inform your employees about its indicators.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A DDoS attack, or Distributed-Denial-of-Service attack, is a &#8230;<\/p>\n","protected":false},"author":1,"featured_media":32230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,292],"tags":[],"class_list":["post-29357","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-ddos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>12 Common Types of DDoS Attacks Explained | EasyDMARC<\/title>\n<meta name=\"description\" content=\"DDoS attack types include application layer, volumetric, and protocol-based exploits. Learn about their sub-categories here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"12 Common Types of DDoS Attacks Explained\" \/>\n<meta property=\"og:description\" content=\"DDoS attack types include application layer, volumetric, and protocol-based exploits. Learn about their sub-categories here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-23T15:40:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-07T09:54:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/08\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"12 Common Types of DDoS Attacks Explained\",\"datePublished\":\"2022-08-23T15:40:31+00:00\",\"dateModified\":\"2023-07-07T09:54:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/\"},\"wordCount\":1906,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"DDoS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/\",\"name\":\"12 Common Types of DDoS Attacks Explained | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg\",\"datePublished\":\"2022-08-23T15:40:31+00:00\",\"dateModified\":\"2023-07-07T09:54:06+00:00\",\"description\":\"DDoS attack types include application layer, volumetric, and protocol-based exploits. Learn about their sub-categories here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"X Common Types of DDoS Attacks Explained 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/12-common-types-of-ddos-attacks-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"DDoS\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/ddos\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"12 Common Types of DDoS Attacks Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"12 Common Types of DDoS Attacks Explained | EasyDMARC","description":"DDoS attack types include application layer, volumetric, and protocol-based exploits. Learn about their sub-categories here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/","og_locale":"en_US","og_type":"article","og_title":"12 Common Types of DDoS Attacks Explained","og_description":"DDoS attack types include application layer, volumetric, and protocol-based exploits. Learn about their sub-categories here.","og_url":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-08-23T15:40:31+00:00","article_modified_time":"2023-07-07T09:54:06+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/08\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"12 Common Types of DDoS Attacks Explained","datePublished":"2022-08-23T15:40:31+00:00","dateModified":"2023-07-07T09:54:06+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/"},"wordCount":1906,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/08\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","DDoS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/","url":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/","name":"12 Common Types of DDoS Attacks Explained | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/08\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg","datePublished":"2022-08-23T15:40:31+00:00","dateModified":"2023-07-07T09:54:06+00:00","description":"DDoS attack types include application layer, volumetric, and protocol-based exploits. Learn about their sub-categories here.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/08\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/08\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg","width":1440,"height":910,"caption":"X Common Types of DDoS Attacks Explained 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/12-common-types-of-ddos-attacks-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"DDoS","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/ddos\/"},{"@type":"ListItem","position":6,"name":"12 Common Types of DDoS Attacks Explained"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/08\/X-Common-Types-of-DDoS-Attacks-Explained-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/29357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=29357"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/29357\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/32230"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=29357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=29357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=29357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}