Jerryrat's blog
    HOME NEWS TOOLS TUTORIALS
Jerryrat
No absolute security system.
  1. Home
  2. Uncategorized
  3. This article

Different types of denial of service attacks under osi layering

2020年04月09日 95Browse 0Like 0Comments

OSI is also called the network seven-layer protocol. There are 7 layers in total, and each layer can have several sublayers. The 7 layers of OSI from top to bottom are: 7 application layer, 6 presentation layer, 5 session layer, 4 transport layer, 3 network layer, 2 data link layer, 1 physical layer. The upper layers (7, 6, 5, 4) define the functions of the application, and the following 3 layers (3, 2, 1) are mainly oriented to the end-to-end data flow through the network. DDoS attacks are classified according to the OSI layer they attack. Although there are seven layers in total, only three layers are targeted during the DDoS attack: layer 3, layer 4, and layer 7.

1. Layer 3 attack

In the OSI model, layer 3 is the network layer. The focus of the layer 3 attack is to saturate the bandwidth of the target site so that the site cannot be used. The size of the attack is measured in bits per second (Bps). include:
UDP flooding attack: UDP flooding will occupy host resources and cause the site to be inaccessible.
ICMP flooding: also known as "ping flooding". Sustained and outgoing bandwidth is affected by this type of attack, resulting in overall system slowdown.

2. Layer 4 attack

The fourth layer of the OSI model is related to the transmission protocol. The goal of the layer 4 attack is to take up server resources, or firewall and load balancer resources. It is measured in packets per second. include:
SYN flood: maliciously occupy resources and refuse the service of legitimate users.
Death Ping: Overflow of memory buffer, resulting in crash, restart, and denial of service to legitimate users.
Reflection attacks: One of the most catastrophic types of attacks. Attacks may involve thousands of computers, all of which ping data back to a single target, resulting in massive slowdowns and denial of service.

3. Layer 7 attack

Layer 7 is the application layer and the layer closest to the user. These attacks are more complicated because they mimic human behavior and interact with the user interface. They target vulnerabilities in OpenBSD, Windows, Apache and other software by using requests that seem legitimate to crash Web servers. The size of the application layer attack is measured by the number of requests per second. include:
Slowloris: Keep all connections open, which will overload the maximum concurrent connection pool and cause denial of service.
HTTP flooding: Use seemingly legitimate HTTP GET or POST requests to attack servers or applications. This attack requires less bandwidth.

Tags: ddos osi
Last updated:2020年04月09日

Jerryrat

Zer0 1s 3ndless.

   like
< Previous
Next >

comment

Cancel reply

Zer0 1s 3ndless.

Newest Hotspots
Newest Hotspots
xss game clearance notes | 4-6 xss game clearance notes | 1-3 Bypass CDN to find real IP method Exposed! The "weapon-grade" extension of Apple's default mail program may have been exploited by national hacker organizations! Cross Site Scripting ( XSS ) Vulnerability Payload List Analysis of Github man-in-the-middle attack principle
Bypass CDN to find real IP method xss game clearance notes | 1-3 couldflare anti-cc deployment tutorial CSS JS loading error after WordPress configures SSL Speed up your website for free with cloudflare Different types of denial of service attacks under osi layering
Tag aggregation
hacking sql injection xss payloads cloudflare xss ddos database wordpress
Bookmarks
  • pop花型网

COPYRIGHT © 2020 Jerryrat's blog. ALL RIGHTS RESERVED.