Retrieved from https://studentshare.org/information-technology/1699953-computer-science
https://studentshare.org/information-technology/1699953-computer-science.
Groups include Destructive, Resource consumption, and Bandwidth consumption attacks. On the other hand, Douligeris and Mitrokotsa advanced the classification to five groups which included Network OS level, Device level, Application level, Data flood, and Protocol feature attack. This can be explained below:
1. Bandwidth-based attacks
This often attacks the routers, servers, and firewall processing resources and thus limits them. Normally, this type of DDoS attack sent a lot of data which leads to an overload making the network bandwidth depleted. There is a reduction in the quality of service when there is an overload attack in a system. This is because the normal access is tempered with.
2. Traffic-based attacks
This kind of attack often sent large traffic attacks in the form of TCP, UDP, and other ICPM. Often people use technology forgery to escape the system monitoring. When the attacks are mixed with malware exploitation, they cause leaking of the information and this may be dangerous. This illegal activity of information leakage will occur while fighting DDoS attacks.
3. Application-based attacks
This is vital as it is used in financial institutions to prevent breaches and leakages of information. Though the attackers may not be many, this attack is taken for specific roles such as canceling fraudulent transactions or accessing a vital database. (Chai, 2013)This often involves targeting the application layer of the OSI model. Normally, application layer data is sent to the attackers to disable their functions.
4. Modus Operandi
Here, there is the involvement of a machine which in most cases is the agent. When the orders are received from the master machine which is controlled by the attacker, these agents will be involved in remitting the packets to a host who is a victim of the attack. The agents and master will then generate an actual attack message instructing the modus operandi to attack the network victim.