Layer |
Type |
AV |
Description |
Network |
TCP |
SYN flood |
TCP-based flood attack, abusing the 3-way handshake. Sending multiple TCP packets with respective TCP flags. |
Tsunamy SYN flood |
SYN-ACK flood |
ACK flood |
RST flood |
PSH flood |
FIN flood |
URG flood |
ACK/FIN flood |
PUSH/ACK flood |
ACK/RST flood |
URG/RST flood |
URG/SYN flood |
URG/RST/SYN/FIN flood |
ACK/PUSH/RST/SYN/FIN flood |
URG/ACK/PUSH/RST/FIN flood |
URG/ACK/PUSH/RST/SYN Flood |
URG/ACK/PUSH/SYN/FIN Flood |
URG/ACK/RST/SYN/FIN Flood |
URG/PUSH/RST/SYN/FIN Flood |
URG/FIN flood |
URG/PUSHf flood |
ACK/PUSH/FIN flood |
ACK/PUSH/RST flood |
ACK/PUSH/SYN flood |
ACK/RST/FIN flood |
ACK/RST/SYN flood |
ACK/SYN/FIN flood |
PUSH/RST/FIN flood |
PUSH/RST/SYN flood |
PUSH/SYN/FIN flood |
RST/SYN/FIN flood |
URG/ACK/FIN flood |
URG/ACK/PUSH flood |
URG/ACK/RST flood |
URG/ACK/SYN flood |
URG/PUSH/FIN flood |
URG/PUSH/RST flood |
XMAS flood |
TCP Middlebox Reflection flood |
TCP-based flood that abuses security flaws in network middleboxes |
Fragmented ACK flood |
ACK flood while the IP packets are fragmented so the PPS rate is higher than in a regular attack |
UDP |
DNS Garbage flood |
UDP flood with malmformed data targeting port 53 |
NTP flood |
UDP flood with malmformed data targeting port 123 |
Fragmented UDP flood |
UDP flood while the IP packets are fragmented so the PPS rate is higher than in a regular attack |
Reflective DNS flood |
UDP-based attacks that abuse network components with security flaws, which makes them sending amplified attacks to a victim target |
Reflective CHARGEN flood |
Reflective Memcache flood |
Reflective SIP flood |
Reflective SSDP flood |
Reflective DHCPDiscover flood |
Reflective SADP flood |
SNMP Reflection flood |
CoAP Reflection flood |
STUN Reflection flood |
IP |
ICMP flood |
Bandwidth floods that abuse different IP protocols |
Ping of Death |
IGMP flood |
ESP flood |
AH flood |
GRE flood |
IPv4-in-IPv4 flood |
IPv6-in-IPv4 flood |
Special techniques |
Carpet Bombing |
Network flood against an entire subnet. For example, against /24 subnet |
Hit and Run |
Network attack that is performed by short bursts that repetitively inflict the target. This technique aims to avoid detection by the risk mitigation |
|
Web |
HTTP GET flood |
HTTP requests flood, by using one of the HTTP methods |
|
HTTP POST flood |
|
HTTP HEAD flood |
|
HTTP OPTIONS flood |
|
HTTP PUT flood |
|
HTTP DELETE flood |
Application |
HTTPS GET flood |
HTTPS requests flood, by using one of the HTTP methods |
HTTPS POST flood |
HTTPS HEAD flood |
HTTPS OPTIONS flood |
HTTPS PUT flood |
HTTPS DELETE flood |
HTTPS Login flood |
HTTPS flood against a login endpoint, by using multiple credentials, saturating the DB's resources |
HTTPS Search flood |
HTTPS flood against a search endpoint, by using multiple credentials, saturating the DB's resources |
HTTPS Randomized path flood |
HTTPS flood against a hostname, while putting malmformed, randomly generated path in every request |
HTTPS Randomized parameters flood |
HTTPS flood against an endpoint with an existing parameter. The attack includes puting a random value in every request. That's a cache busting attack vector |
HTTPS Randomized HTTP headers flood |
HTTPS flood with random number and values of HTTP headers. Its objective is to bypass signature-based risk mitigations |
HTTPS Randomized Cipher-Suites |
HTTPS flood with different client TLS fingerprints. It randomizes the JA3 and JA4 signatures of the requests |
HTTP/2 Rapid Reset |
HTTP/2 protocol abuse by sending requests and shuttnig them off before their completion. It allows an attacker to amplify their HTTPS request volume |
HTTP flood Direct-to-Origin |
HTTP against the origin IP, bypassing the proxy service |
HTTPS flood Direct-to-Origin |
HTTPS against the origin IP, bypassing the proxy service |
HTTPS multiple URI flood |
HTTPS flood that targets multiple, existing paths |
Browser engine support |
HTTP flood with JS support |
HTTP flood with a tool that supports Javascript |
HTTS flood with Cookie support |
HTTP flood with a tool that can recieve and send cookies |
HTTPS flood with JS support |
HTTPS flood with a tool that supports Javascript |
HTTPS flood with Cookie support |
HTTPS flood with a tool that can recieve and send cookies |
Low and Slow |
Slow Read |
Low & slow attack that fetches specfic content very slowly from the server. It keeps hte connection between the client and server open for a long time, saturating the server's resources, which requires it to hold multiple connections at the same time |
Slow POST |
Low & slow attack that uploads content very slowly to the server. It keeps hte connection between the client and server open for a long time, saturating the server's resources, which requires it to hold multiple connections at the same time |
TLS renegotiation |
Low & slow attack where the client opens TLS sessions and constantly requests to renegotiate the encryption keys with the server. It saturates the server's resources |
HTTP/2 continuation flood |
Low & slow attack where the attacker abuses the HTTP/2 framing syntax, making lots of never-ending requests streams, thus keeping the connection between the client and server open, causnig resources saturation to the server |
Volumetric-applicative |
Large File Download |
Low-request-rate application attack, where an attacker pulls a large file from the victim server, causing uplink pipe saturation. This AV is useful for avoiding rate limit detection |
Large File Download with randomized parameters |
Large File Download with a randomized parameter attack that's meant to bust the caching mechanism provided by a CDN |
Large File Upload |
Low-request-rate application attack, where an attacker sends requests with large body size to the victim server, causing downlink pipe saturation. This AV is useful for avoiding rate limit detection |
DNS |
DNS Query flood |
An attacker sends the same DNS query multiple times against the DNS server, causing resource saturation |
DNS Dictionary flood |
An attacker sends lots of different DNS queries to the victim DNS server, causing resource saturation |
TLS |
TLS flood |
An attacker performs multiple TLS client hello requests against the victim server. Since the server will respond with server-hello and begin the encryption sequence, it may reach resource saturation |
|
|
|
|
|
|
|
|
|