Not all DDoS attacks are the same

Written by:
Lucie Sadler
Date Posted:
1 August 2019

Types of DDoS attack

In 2018, the UK’s National Crime Agency named DDoS attacks and ransomware the joint leading threat facing businesses. Over the past 20 years, DDoS attacks have evolved in size, scale and sophistication.

As hackers enlist new technologies like IoT devices to distribute and amplify attacks, DDoS attacks have become a threat that organisations can no longer choose to ignore. Hosting providers must encourage businesses to place as much emphasis on cyber security as they do on any other part of their business.

Types of DDoS attacks
DDoS attacks come in different sizes and variations but can be broadly divided into three main categories.

  • Volume Based Attacks
    These attacks are the most common types of DDoS attacks, where hackers utilise several computers and internet connections to flood a website with traffic so that it becomes overwhelmed and uses up all of the site’s bandwidth. Normal traffic is then unable to pass through and hackers are able to take down the website.Volume based attacks are measured in bits per second (Bps). Examples include UDP floods, ICMP floods, and other spoofed-packet floods.
  • Protocol Attacks
    Protocol attacks aim to overuse server resources instead of bandwidth and also target things like firewalls and load balancers in their attacks. Hackers overwhelm websites and server resources by making fake protocol requests to consume the available resources. These attacks are measured in packets per second (Pps). Examples of protocol attacks include Smurf DDoS and fragmented packet attacks.
  • Application Layer Attacks
    Application Layer attacks require fewer resources than other main types of DDoS attacks, as they bring down servers by making a large number of requests that mimic users’ traffic behaviour. Application layer attacks disrupt specific functions or features of a website and target vulnerabilities within applications such as Apache, Windows and OpenBSD. These attacks are measured in requests per second (Rps). Examples of Application Layer Attacks are Slowloris and HTTP floods.#

Hyve’s DDoS Defence
Hyve’s DDoS Defence System provides multiple, diversely routed 100G connections to multiple T1 ISPs, meaning that a typical DDoS attack won’t affect our customers. If however, there is a large enough attack, we are able to seamlessly swing the affected network and respective traffic out to a segregated scrubbing facility located independently of our primary network. This traffic is then filtered and cleaned before being passed back, thereby allowing the attacked service to remain online without interruption.

Find out how Hyve’s DDoS Defence service can help to protect your business by contacting our sales team on 0800 612 2524.

Rating: 5.0/5. From 1 vote.
Please wait...
Voting is currently disabled, data maintenance in progress.

Recommended Videos

Find out why Safestore adopted Hyve as their hosting provider

Case Studies

Hyve are 100% carbon neutral. We use carbon offsetting to balance out the release of carbon dioxide from our offices and infrastructure.