DDoS attacks employ a wide range of
mechanisms, as Figure 1 shows.1 To
give a better sense of how such attacks work, we describe
two popular types: volumetric attacks, also known as floods,
and reflection/amplification attacks. In addition to DDoS
attacks, we describe attempts to steal data using Web application
exploits. Our goal here is not to be comprehensive but
only to provide a flavor of common current attack modes