Security Glossary: DDoS

Volumetric DDoS Attacks

Volumetric DDoS Attacks

These attacks, measured either in Gigabits (or even Terrabits) of inbound traffic per second in the network layer or HTTP/s requests per second in the application layer, typically use distributed resources, such as hijacked computing devices and botnets to generate more traffic then the targeted system can absorb. Network layer attacks (L3/L4) typically target the network capacity with a flood of “meaningless” network packets while Application layer attacks (L7) target server resources such as memory or Input/Output capacities through a flood of requests that will be executed and responded by the attacked servers, until systems resources are exhausted.

Volumetric DDoS attacks represent a formidable and evolving threat in the realm of cybersecurity. These attacks are characterized by their sheer scale, often measured in Gigabits or even Terrabits of inbound traffic per second in the network layer. Alternatively, in the application layer, they can be gauged by the rate of HTTP/s requests per second. The primary objective of volumetric DDoS attacks is to inundate the target system with a volume of traffic or requests that surpasses its capacity to handle.

To execute these attacks, malicious actors harness distributed resources, which may include a network of compromised computing devices and botnets. These resources are unwittingly enlisted in the attack, amplifying the volume of traffic or requests that can be generated. The distributed nature of these attacks makes them challenging to trace and mitigate effectively.

Network layer attacks, categorized as L3/L4, focus on overwhelming the target’s network capacity. Attackers achieve this by inundating the network infrastructure with a deluge of seemingly meaningless network packets. These packets flood the target’s network, leading to congestion and rendering the online service or website inaccessible. The core tactic here is to exploit the limitations of the network’s bandwidth.

In contrast, application layer attacks, designated as L7, zero in on the server’s resources, such as memory and Input/Output (I/O) capacities. Attackers launch a torrent of requests designed to be executed and responded to by the attacked servers. This deluge of requests can overwhelm the server’s processing capabilities, causing it to slow down or become unresponsive. The attackers target vulnerabilities in the server’s ability to handle a high volume of concurrent requests.

In summary, volumetric DDoS attacks are characterized by their massive scale, utilizing distributed resources to flood the target with traffic or requests. Network layer attacks exploit network bandwidth limitations, while application layer attacks focus on overloading server resources. Mitigating these attacks requires robust defense mechanisms and threat intelligence to identify and respond to evolving tactics.