Types of DoS Attacks
The main types of DoS attacks are as follows:
Ø Ping of
death: Sending a malformed or otherwise malicious ping to a computer
Ø Teardrop:
Forging fragmented packets designed to overlap each other when the receiving
hosts defragment them
Ø SYN
flooding: Sending TCP connection requests to a target host faster than it can
process them
Ø LAND:
Sending a data packet to a targeted machine with the same host and port names
for the source and the destination
Ø Smurf:
Using spoofed IP addresses to send broadcast ping messages to a large number of
hosts in a network to flood the system
Ø Fraggle:
Using UDP packets to flood a network
Ø Snork:
Targeted against Windows NT RPC services
Ø OOB
attack: Exploiting a bug in Microsoft’s implementation of its IP stack
Ø Buffer
overflow attack: Sending more information to a program than it is allocated to
handle
Ø Nuke
attack: Repeatedly sending fragmented or invalid ICMP packets to the target
computer
Ø Reflected
attack: Sending false requests to a large number of computers, which respond to
those requests.