- Practical Network Scanning
- Ajay Singh Chauhan
- 266字
- 2022-07-12 10:43:08
Volume-based attacks
Volume based attacks are by far the most common type of DDoS attacks.
According to Arbor Networks, 65% of DDoS attacks are volumetric in nature.
Volume-based attacks are characterized by an excessive amount of traffic (sometimes in excess of 100 Gbps). They do not mandate large amounts of traffic to be generated by one location or one source.
The following is an example of such an attack:
- NTP Amplification: The NTP amplification attack is a volume based DDoS attack in which an attacker exploits the publicly accessible Network Time Protocol (NTP) server functionality. This command, called monlist, sends the requester a list of the last six hundred hosts that were connected to the queried server. So, for a small query, response data is very high. Let us consider the fact that the ratio of query:response is 1:50. This means that attackers can generate 50 Gpbs of traffic using a NIC of 1 Gbps, and the same thing will be replicated across multiple sources. This can cause multiple terabits of traffic in a network.
In the following diagram, you can see that attackers generate a query to public NTP servers with the spoofed IP of a victim. In response to an NTP query, the server sends a huge amount of data to the victim's IP, which chokes the network for the victim and make resources unavailable:

- Mitigation: Source IP verification should be activated to prevent spoofed packets from leaving the network.
Other similar examples of volume based attacks are:
- User Datagram Protocol (UDP) Floods
- ICMP floods
- Domain Name Servers (DNS) Amplification
- Character Generator (Chargen)
推薦閱讀
- 數(shù)字身份與元宇宙信任治理
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- Learning Python for Forensics
- 網(wǎng)絡(luò)安全保障能力研究
- 等級(jí)保護(hù)測(cè)評(píng)理論及應(yīng)用
- Testing and Securing Android Studio Applications
- 網(wǎng)絡(luò)安全技術(shù)與實(shí)訓(xùn)(第4版)(微課版)
- 模糊測(cè)試:強(qiáng)制發(fā)掘安全漏洞的利器
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 網(wǎng)絡(luò)安全態(tài)勢(shì)感知
- 黑客攻防從入門(mén)到精通
- 黑客攻防實(shí)戰(zhàn)從入門(mén)到精通
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測(cè)試
- 密碼朋克:自由與互聯(lián)網(wǎng)的未來(lái)