Skip to content

Latest commit

 

History

History
30 lines (19 loc) · 1.66 KB

File metadata and controls

30 lines (19 loc) · 1.66 KB

DDOS Research

Attack types:

TCP packet attacks (SYN/ACK/SYNACK/XMAS etc.) attacks tcppkt.md

TCP reflection attacks (RST, SYNACK) tcpreflection.md

UDP reflection attacks (LDAP, DNS, etc.) udp.md

Mitigation methods

Simplest: any external scrubber service: voxility, akamai, cloudflare, TCPShield etc

Or: In-house, based on software like wanguard, corero or custom detection.

Layers: networking jargon

image

The most important terms are:

  • L2: Mac addresses, the physical address of your switch/network card/router/firewall
  • L3: IP protocol, ICMP: your IP addresses and some other information. May also be ICMP (often used for debugging, used in tools like ping)
  • L4: UDP/TCP Protocol: the raw packet bytes. TCP requires a full connection and is generally used. UDP is used when packets are allowed to be dropped and need to come as fast as quickly (video, gameservers)
  • L7: The actual application protocol. Think http, SIP, DNS, etc. L7 attacks are the most expensive to execute but also the most effective. Mitigation depends on the kinds of applications that you are running.

Contributing

Has this article helped you or do you want to contribute? You are very welcome to open up a Github issue or PR request. Only together we can end this problem that is DDoS.

fan art

drawing