Volumetric and Amplification attacks explained by DDoS defence professionals

How bandwidth-focused DDoS campaigns work—and why they’re still effective at scale

Volumetric DDoS attacks remain one of the most common and disruptive forms of denial-of-service activity across the internet. Despite evolving tactics, the core objective is the same: exhaust the network capacity of a target by overwhelming it with traffic. This article explores how volumetric attacks work, how amplification plays into them, and what defenders should understand when detecting and mitigating these threats.

This article is part of a longer series of articles about different types of DDoS attacks. If you’re new here, have a look at our DDoS taxonomy to start with a solid understanding of how volumetric and amplification attacks fit into the wider DDoS attack landscape. 

What Is a Volumetric DDoS Attack?

A volumetric DDoS attack aims to consume the bandwidth of the target system—or its upstream providers—by sending overwhelming amounts of data. These attacks are designed to flood the network layer (Layer 3) and transport layer (Layer 4), effectively clogging all available capacity.

This approach doesn’t try to exploit application vulnerabilities. Instead, it focuses on brute-force disruption of internet connectivity.

How Volumetric Attacks Work

At their core, volumetric attacks use large volumes of packets—often from distributed sources—to saturate links and infrastructure. The most common mechanisms include:

UDP Flood

A UDP flood sends large numbers of User Datagram Protocol packets to random or targeted ports on the victim’s IP address. Because UDP is stateless, the server either processes the traffic or responds with ICMP Destination Unreachable messages, consuming additional resources.

ICMP Flood (Ping Flood)

This method sends a large number of ICMP Echo Request (ping) packets, often targeting infrastructure or endpoints directly. Some variants use broadcast addresses to generate amplified ICMP replies to the spoofed victim IP.

TCP-Based Floods

While not as common in pure volumetric campaigns, TCP SYN floods and RST floods can be used to consume state on connection tables, especially if combined with other tactics.

Key Characteristics

Here are some of the common characteristics of volumetric attacks:

FeatureDescription
Attack GoalMaximize traffic volume to saturate bandwidth
MeasurementTypically in Gbps or packets per second (pps)
Common ProtocolsUDP, ICMP, TCP SYN
Botnet RequirementUsually requires high-scale distributed traffic sources
Mitigation ChallengeVolume alone can overwhelm links before deeper filtering can take place

Amplification: A Subclass of Volumetric Attacks

Amplification attacks are a more efficient variant of volumetric DDoS. Rather than sending large volumes directly, attackers send small, spoofed requests to vulnerable third-party servers, which then respond with much larger replies to the target.

This allows an attacker to multiply their outbound bandwidth—turning a small investment into a massive flood.

How Amplification Works (Step-by-Step)

  1. Spoofed Source: Attacker sends a forged request with the victim’s IP address.
  2. Open Service Responds: Vulnerable server replies with a much larger response.

Victim Flooded: The response is directed to the victim, consuming their bandwidth.

Common Amplification Vectors

Here are some of the most common amplification vectors explained, with their typical amplification ratio:

Protocol/ServiceVector DescriptionAmplification Ratio (Typical)
DNSQueries (e.g., ANY/TXT) sent to open resolvers30x–100x
NTPAbuse of the monlist command20x–200x
MemcachedSpoofed queries result in multi-megabyte responsesUp to 50,000x
CLDAP / SSDPLightweight protocols with poor access controls50x–70x

These services are often exposed due to misconfiguration or legacy deployments. Their amplification ratios depend on response size vs request size.

Real-World Example: DNS Amplification

A typical DNS amplification attack might involve:

  • Sending a 60-byte ANY-type DNS query to an open resolver, spoofing the victim’s IP.
  • The resolver responds with a 4,000-byte DNS response.
  • Amplification ratio: ≈ 67×.

With just 1 Gbps of spoofed queries, an attacker could generate 67+ Gbps of inbound traffic directed at the victim.

Volumetric vs Amplification: Key Differences

It’s important to note: all amplification attacks are volumetric, but not all volumetric attacks involve amplification. Below are some of the key technical differences listed.

CharacteristicVolumetric AttackAmplification Attack
Traffic SourceDirect from attacker (often via botnet)Reflected from third-party servers
Spoofing RequiredOptionalRequired
EfficiencyLow (relies on raw scale)High (relies on protocol weaknesses)
Detection CluesLarge traffic volumes, many sourcesHigh-volume responses from known reflectors
Mitigation ApproachRate-limiting, filtering, blackholingReflection-aware filtering, IP reputation, Flowspec rules

Detection and Defence: What Matters Most

To effectively mitigate these attacks in real time, defenders need:

  • Protocol and Port-Level Visibility: Identify abnormal surges in traffic types (e.g., UDP/123, UDP/53). Have a look at FastNetMon’s network visibility tools here.
  • Per-IP and Per-Prefix Thresholds: Customise detection rules for bandwidth, packet rate, and flow count per asset. Read our guide on setting thresholds here.
  • Anomaly Detection: Spot deviations from baseline traffic—especially relevant for low-and-slow or spread-out (carpet bombing) attacks.
  • Reflection Pattern Awareness: Recognise common amplification signatures (e.g., many unsolicited DNS responses).
  • Automated Mitigation Tools: BGP blackholing, Flowspec filtering, and integration with inline scrubbing or firewalls. Have a look at FastNetMon’s stack here.

Fast detection and precise reaction are critical. Bandwidth exhaustion can happen in seconds once a volumetric campaign starts.

Summary

Volumetric and amplification attacks continue to dominate the DDoS landscape due to their simplicity, scalability, and ability to take networks offline without exploiting application logic.

  • Volumetric attacks rely on high packet volume to flood links directly.
  • Amplification attacks abuse misconfigured third-party services to dramatically increase attack size.
  • A strong DDoS defence strategy requires real-time traffic analytics, dynamic thresholds, and automated mitigation methods that respond in seconds. 

Want a full understanding of different DDoS attack types and how to defend agains them? Continue reading our article for a full DDoS classification


About FastNetMon

FastNetMon is a leading solution for network security, offering advanced DDoS detection and mitigation. With real-time analytics and rapid response capabilities, FastNetMon helps organisations protect their infrastructure from evolving cyber threats.

For more information, visit https://fastnetmon.com

24/7 Tech Support

support@fastnetmon.com

Email Us

sales@fastnetmon.com