DDoS Taxonomy
DDoS attacks are typically classified by the OSI layer they target. As a senior engineer, it's crucial to identify which layer is under stress to apply the correct mitigation.
- Volumetric Attacks: These focus on saturating the network bandwidth. Examples include UDP Floods and ICMP Floods. Mitigation often requires upstream scrubbing services (like Cloudflare or Akamai).
- Protocol Attacks: These target server resources like connection tables in firewalls or load balancers. The SYN Flood is the classic example.
- Application Layer Attacks: These target specific functions of an application, such as HTTP GET/POST Floods or Slowloris. They are harder to detect because they look like legitimate traffic.
The SYN Flood Mechanism
By exploiting the TCP three-way handshake, an attacker sends many SYN packets but never completes the handshake with an ACK. This leaves the server with many 'half-open' connections, eventually exhausting the SYN backlog.