•  Home
  •  Dashboard
  •  Company
    • About Us
    • Blog
    • Careers
    • Contact Us
    • Data Centers
    • Looking Glass
    • Network
    • Reseller
  •  Hosting Services
    • Infrastructure
      • iColocation
    • Compute
      • cMetal
      • cVirtual
    • Storage
      • sObject
      • sBlock
    • Networking
      • nCDN
      • nIP Transit
      • nWavelength
    • Protection
      • pBackup
      • pDDoS
  •  Solutions
    • Ecommerce
    • Finance
    • Gaming
    • Hosting
    • Management
    • Security
    • System Integrator
  •  Support
    • Community
    • Knowledge Base
    • Open A Ticket
  •  USA & Canada: 800-933-1517
  •  International: 626-549-2801
  •  Email: sales@psychz.net
  • Services
    • new-colocation-header-img
      Infrastructure
      • iColocation
    • new-compute-header-img
      Compute
      • cMetal
      • cVirtual
    • new-storage-header-img
      Storage
      • sObject
      • sBlock
    • new-networking-header-img
      Networking
      • nCDN
      • nIP Transit
      • nWavelength
    • new-protection-header-img
      Protection
      • pBackup
      • pDDoS
  • Solutions
    • Ecommerce
    • Security
    • Gaming
    • Hosting
    • Management
    • Finance
    • System Integrator
  • Dashboard

Common Types of Network Attacks

  • Home
  • Client
  • Knowledgebase
  • Network
  • Common Types of Network Attacks

Table Of Content

Related Articles

  • Setup VPN on CentOS 8
  • Data Center Redundancy: N+1
  • What is the difference between Latency, Bandwidth and Throughput?
  • How To Point A Domain Name To An IP Address
  • How to do a speed test using Psychz looking glass?
  • Quagga Routing - Install, Configure and setup BGP
  • Guide to establish a GRE Tunnel and BGP peering session on MikroTik RouterOS
  • Community Strings For Psychz Networks
  • IPv4 - Subnetting made easy
  • Centos add virtual IP(s)
  • Views: (1136)
  • Votes: (0)
Was this article helpful?
VOTE

Common Types of Network Attacks

Publisher: Psychz Networks,  February 01,2016

Network attacks, or what the industry calls DDoS(Distributed Denial of service) is the common method used for attackers to render a network useless, bring down sites, disrupt government sites. There are multiple types of common attacks we are going to cover. However, there is no true example of the types of attack that exist.

  • SSDP
  • NTP
  • ICMP
  • ICMP Echo Request
  • IP Packet Fragment
  • SMURF
  • IGMP
  • Ping of Death
  • TCP SYN Flood
  • TCP Spoofed SYN Flood
  • TCP SYN ACK Reflection Flood
  • TCP ACK Flood
  • TCP Fragmented Attack
  • UDP Flood
  • UDP Fragment Flood
  • Distributed DNS Amplification Attack
  • HTTP(S) GET/POST Flood
  • DDoS DNS

There are three ways of making your server, or infrastructure unavailable:

Bandwidth: this type of attack consists of saturating the server's network capacity, which renders it unreachable.

Resources: this type of attack consists of depleting the machine's system resources, which prevents it from responding to legitimate requests.

Exploitation of software fault: also called "exploit", this type of attack targets a particular software fault either to make the machine unavailable or to take control of it.

Three of the most common attacks are:

SSDP attacks: 1900/UDP
This type of attack has an amplified reflective DDOS attack. This attack uses the UPnP(Universal Plug and Play) protocol that allows devices to discover their neighbor hardware, network discovery, broadcasting presence. The way the attack performs two task.
1) Spoofs the attacker IP and replaces it with the victim IP.
2) The attacker sends a series of UPnP queries to the server, each request increases by size, so the larger the attack gets the harder it is for the local network to respond to the request coming from the attacker. Ending with a complete overload of the network to the server.

NTP attack:
123/UDP this is a type of attack targets the local server NTP that is used to keep the local server time synchronized. NTP attacks are commonly done via botnets that exist on exploited machines. When an attack gets to trigger the exploited host send millions of NTP synchronization request to the victim NTP server until the local server network is congested and crashes.

ICMP attack:
This is a ping attack. ICMP attacks are a type of attack that floods the local network connections by sending a series of echo request to the victim, the victim then sends an excessive amount of echo responds to the attack, but the attack may not have a routable destination due to the IP being spoofed.

ICMP Echo Request Flood
L3 Resource also called Ping Flood, mass sending of packets implicating the response of the victim, which has the same content as the original packet.

IP Packet Fragment Attack
L3 Resource Sending of IP packets that voluntarily reference other packets that will never be sent, which saturates the victim's memory.

SMURF
L3 Bandwidth ICMP broadcast attack usurping the source address to redirect multiple responses to the victim

IGMP Flood
L3 Resource Mass sending of IGMP packets (multicast management protocol)

Ping of Death
L3 Exploit Sending of ICMP packets which exploit an implementation bug in certain operating systems

TCP SYN Flood
L4 Resource Mass sending of TCP connections requests

TCP Spoofed SYN Flood
L4 Resource Mass sending of TCP connections requests to usurp the source address

TCP SYN ACK Reflection Flood
L4 Bandwidth Mass sending of TCP connections requests to a large number of machines, usurping the victim's source address. The bandwidth of the victim will be saturated by the responses to these requests.

TCP ACK Flood
L4 Resource Mass sending of TCP segment delivery receipts

TCP Fragmented Attack
L4 Resource Sending of TCP segments that voluntarily reference other segments that will never be sent, which saturates the victim's memory

UDP Flood
L4 Bandwidth Mass sending of UDP packets (not requiring a previously-established connection)

UDP Fragment Flood
L4 Resource Sending of UDP datagrams that voluntarily reference other datagrams that will never be sent, which saturates the victim's memory

Distributed DNS Amplification Attack
L7 Bandwidth Mass sending of DNS requests usurping the source address of the victim, to a large number of legitimate servers. As the response is more voluminous than the question, an amplification of the attack follows DNS Flood L7 Resource Attack of a DNS server by mass sending of requests

HTTP(S) GET/POST Flood
L7 Resource Attack of a web server by mass sending of requests

DDoS DNS
L7 Resource Attack of a DNS server by mass sending of requests from a large set of machines which are under the attacker's control

Related Articles

  • Setup VPN on CentOS 8
  • Data Center Redundancy: N+1
  • What is the difference between Latency, Bandwidth and Throughput?
  • How To Point A Domain Name To An IP Address
  • How to do a speed test using Psychz looking glass?
  • Quagga Routing - Install, Configure and setup BGP
  • Guide to establish a GRE Tunnel and BGP peering session on MikroTik RouterOS
  • Community Strings For Psychz Networks
  • IPv4 - Subnetting made easy
  • Centos add virtual IP(s)
  • Views: (1136)
  • Votes: (0)
Was this article helpful?
VOTE
Copyright © 2025 Psychz Networks,
A Profuse Solutions Inc Company
Hosting Services
Infrastructure
  • iColocation
Compute
  • cMetal
  • cVirtual
Storage
  • sObject
  • sBlock
Networking
  • nCDN
  • nIP Transit
  • nWavelength
Protection
  • pBackup
  • pDDoS
Company
  • About Us
  • Blog
  • Careers
  • Contact Us
  • Data Centers
  • Looking Glass
  • Network
  • Reseller
Policies
  • Acceptable Usage Policy
  • Privacy Policy
  • Service Level Agreement
  • Terms and Conditions
Support
  • Community
  • Knowledge Base
  • Open A Ticket
Get In Touch
  • Psychz Networks,
    A Profuse Solutions Company
    611 Wilshire Blvd #300
    Los Angeles,California 90017
    USA
  • US/Canada: 800-933-1517
  • International: 626-549-2801