Classification of DDoS attacks complete DDoS Taxonomy for DDoS defenders

A practical breakdown of DDoS attack vectors, built for network operators

When your NOC wallboard lights up red, you don’t have 5 seconds. And if you’re relying on manual triage at that point, it is a tough job.

Ideally, you’ve preloaded mitigation rules for the most common vectors. But when something new slips through, classification still matters. Knowing what kind of attack you’re seeing—and what response path to trigger—can make the difference between a minor incident and a major outage.

This guide acts as your mental model and checklist for exactly that moment. It helps turn reactive scrambling into repeatable, automatable playbooks.

In 2025, the attack surface is broader than ever. Cloudflare reported 7.3 Tbps / 4.8 Bpps network floods in Q2 2025, while Google weathered a 398 million RPS HTTP/2 Rapid Reset storm. The techniques are evolving—and so should your defence logic.

FastNetMon’s DDoS Taxonomy

We group attacks by what they try to break:

GroupWhat it targetsKey question
A. Volumetric / AmplificationLinks, NICs, routersWill it fill my pipes?
B. Transport / State-ExhaustionFirewalls, proxies, OS stacksWill it kill my state tables?
C. Application / Resource AbuseCPUs, databases, APIsWill it burn my backend?
D. Stealth / Modulation TechniquesDetection heuristicsWill it evade thresholds?

A. Volumetric & Amplification Attacks

Will it fill my pipes?

VectorProto / PortTypical Amp.Record SizeShort Mechanics
DNS amplificationUDP/53≤70×1.3 TbpsSpoofed ANY/TXT to open resolvers
NTP MONLISTUDP/123200–500×400 GbpsServer replies with 600 host list
CLDAPUDP/38956–70×70 GbpsConn-less LDAP reply
SSDP / UPnPUDP/190020–30×112 GbpsSpoofed M-SEARCH to IoT
MemcachedUDP/1121110,000–51,000×1.7 TbpsCached payload dump
Jenkins discoveryUDP/328320–100×Growing fastMulticast reflection
RIPv1UDP/52010–20×0.5 TbpsRouting table spoof
QUIC broadcastUDP/4438–30× + CPUEmergingOne Initial pkt → many workers
TCP middlebox refl.TCP/80,4432–75×11 GbpsProxy rejects reflected
TCP SYN-ACK refl.TCP/*5–50×CommonLB SYN-ACKs on spoofed SYNs
Smurf / FraggleICMP / UDP/72–5×RareBroadcast echo/reply

Understanding Volumetric Attacks

Volumetric and amplification-based DDoS attacks are designed to consume network bandwidth, often overwhelming routers, switches, and firewalls before the traffic even hits your application layer. These attacks exploit open or misconfigured servers to amplify small requests into massive payloads directed at a victim.

Classic UDP-based amplifiers such as DNS, NTP, and CLDAP are still widely abused due to their high amplification factors and continued presence in legacy systems. More recent additions like Memcached offer staggering amplification ratios, with single-packet queries returning hundreds of kilobytes.

A newer trend is the exploitation of protocols that were not traditionally seen as reflective, such as QUIC. By abusing initial handshake behavior or load-balancer misconfigurations, attackers can trigger wide amplification patterns that include CPU burn, not just bandwidth floods.

Carpet-bombing is an increasingly common stealth technique. Instead of flooding a single IP, attackers distribute packets evenly across entire IP blocks—such as a /24—making per-host traffic appear benign, while the total volume exceeds hundreds of Gbps. This method bypasses many per-IP detection thresholds and demands broader visibility to detect.

The key defence here is network-layer filtering using BGP Flowspec, access control lists (ACLs), and upstream scrubbing providers. Detection must go beyond absolute volume and account for protocol anomalies and dispersion patterns.

B. Transport & State-Exhaustion Attacks

Will it kill my firewalls or proxies?

AttackLayerCVE / YearPeak SeenCore Abuse
SYN flood3/44.2 TbpsHalf-open queue exhaustion
TCP Reset flood411 MppsSpoofed RST tears down sessions
HTTP/2 Rapid Reset72023398M rpsRST_STREAM spam to hold conn
HTTP/2 Continuation72024PoC → OOMInfinite CONTINUATION frames
QUIC-loris (Initial flood)4/72025High CPU0-RTT handshake loops
gRPC SETTINGS/HPACK72019–2024App stallSETTINGS loop + header abuse
IP fragment overlap380 GbpsReassembly buffer overflow
Pulse-wave modulationmeta2024300–350 GbpsOn/off bursts defeat baselines

Understanding State-Exhaustion Attacks

These attacks exploit the asymmetric cost of maintaining connection state. A small number of malicious packets can consume disproportionately large amounts of CPU, memory, or table entries in firewalls and proxies.

SYN floods remain a classic and effective attack by filling up the half-open TCP connection queue. Meanwhile, TCP Reset floods tear down legitimate sessions by spoofing RST packets, disrupting user experience without consuming significant bandwidth.

State-exhaustion attacks have evolved to layer 7, with HTTP/2 being the prime target. The Rapid Reset vulnerability, for instance, enables a client to reuse a single TCP connection to generate millions of stream resets, effectively stalling backend thread pools while staying under protocol stream limits.

QUIC and gRPC are also vulnerable, often by abusing handshake flows or metadata processing logic. These attacks tend to result in CPU spikes or thread starvation in proxies and load balancers.

Pulse-wave modulation—a modulation technique where attackers alternate between bursts and silence—makes these attacks harder to detect using baseline rate thresholds. For mitigation, consider stateless defenses such as SYN cookies, QUIC retry tokens, header-size caps, and connection rate limits per source IP.

C. Application-Layer & Low-and-Slow Attacks

Will it burn my CPUs or databases?

VectorMetricTrickTarget Environment
HTTP GET/POST floodUp to 200M rpsBot swarms with cache-bust paramsE-commerce, fintech
Slowloris / slow POST<1 Mbps stallsPartial headers/bodiesApache, Nginx
GraphQL introspection1–10k rps1000+ directives or recursionAPI backends
WebSocket flood100k conn/sChat open + discard framesGaming, social
gRPC ping-pongFew k rpsKeep-alive + metadata loopMicroservice meshes
Login/cache-bust spray10–40k rpsUnique queries bypass CDNSaaS, portals
Prefix-scatter L71–2k rps/IPSame req across /24Hosting infra

Understanding Application-Layer Abuse

Layer-7 attacks focus on CPU, memory, and application logic, often flying under the radar of volumetric detection systems. These vectors abuse HTTP, WebSocket, GraphQL, and gRPC to exhaust server resources.

The simplest form is an HTTP GET or POST flood, often using browser-like bots with randomised headers or query strings that bypass caching layers. Slowloris-style attacks consume sockets by sending partial HTTP headers or bodies at a trickle.

Modern APIs introduce new risks. GraphQL introspection queries can trigger deep recursion with minimal input. gRPC SETTINGS floods and header compression loops are capable of stalling or crashing backend services even with low RPS.

Layer-7 vectors are particularly dangerous due to their low bandwidth profile, often staying under traditional detection thresholds. Furthermore, CDN and WAF layers are not immune, especially when attackers vary queries to force cache misses.

To mitigate, deploy dynamic rate-limiting per endpoint, enable CAPTCHA and authentication challenges, use circuit breakers, and enforce schema/query depth limits on APIs.

D. Emerging and Evasive Techniques

Several trends in DDoS evolution demand attention:

  • IPv6 Reflection: Over 3,500 ASes expose v6 amplifiers. Source validation (SAV) is lacking in over 60% of them.
  • WebTransport & WebRTC Abuse: TURN relays can reflect traffic with 10–15× amplification. Early PoCs already exist.
  • AI-Powered Bots: Attackers now emulate real browser behavior—jitter, headers, cookie use—making them harder to filter.

Modulation techniques such as carpet-bombing and pulse-wave attacks further complicate detection. These methods spread load across the address space or time to evade traditional alerts based on volume or sustained rates.

Detection systems must evolve to correlate traffic patterns across subnets, monitor time-based anomalies, and analyse protocol behaviour at the application layer.

How to Use This Taxonomy in Real Incidents

SymptomLikely VectorLookup Table
Huge PPS on one portAmp/reflectionTable A
High conn/sec, low bandwidthState exhaustionTable B
Backend 500s, normal NetFlowApplication abuseTable C

Mitigation Matchups:

Attack ClassMitigation Strategy
VolumetricBGP Flowspec, scrubbing, ACLs
State ExhaustionProtocol hardening (SYN cookies, stream caps)
ApplicationDynamic rate-limiting, query caps, circuit breakers

Detection systems should be updated with heuristics for:

  • Carpet-bombing: Multi-IP floods per /24 or /22
  • Pulse-wave: High-frequency burst/idle cycles

Summary: Know the Beast, Load the Bullet

  • Reflection attacks are evolving—QUIC and TCP are viable amplifiers now.
  • Protocol design flaws (e.g., HTTP/2, gRPC) drastically increase DDoS efficiency.
  • Low-and-slow vectors remain potent, especially against APIs.
  • IPv6 will be the next hot zone—start enabling uRPF and source validation today.

Stick this post on your team wiki. When the next flood hits, you’ll know what you’re facing—and exactly how to respond.

Happy packet herding!


About FastNetMon

FastNetMon is a leading solution for network security, offering advanced DDoS detection and mitigation. With real-time analytics and rapid response capabilities, FastNetMon helps organisations protect their infrastructure from evolving cyber threats.

For more information, visit https://fastnetmon.com

24/7 Tech Support

support@fastnetmon.com

Email Us

sales@fastnetmon.com